Date
June 26, 2025, 9:10 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 1523.222402] ================================================================== [ 1523.222430] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 1523.222466] Write of size 1 at addr ffff000800d210c9 by task kunit_try_catch/229 [ 1523.222499] [ 1523.222513] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.222571] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.222589] Hardware name: ARM Juno development board (r2) (DT) [ 1523.222610] Call trace: [ 1523.222621] show_stack+0x20/0x38 (C) [ 1523.222657] dump_stack_lvl+0x8c/0xd0 [ 1523.222695] print_report+0x118/0x608 [ 1523.222734] kasan_report+0xdc/0x128 [ 1523.222773] __asan_report_store1_noabort+0x20/0x30 [ 1523.222809] krealloc_less_oob_helper+0xa48/0xc50 [ 1523.222848] krealloc_less_oob+0x20/0x38 [ 1523.222884] kunit_try_run_case+0x170/0x3f0 [ 1523.222921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.222965] kthread+0x328/0x630 [ 1523.222995] ret_from_fork+0x10/0x20 [ 1523.223031] [ 1523.223040] Allocated by task 229: [ 1523.223056] kasan_save_stack+0x3c/0x68 [ 1523.223088] kasan_save_track+0x20/0x40 [ 1523.223120] kasan_save_alloc_info+0x40/0x58 [ 1523.223146] __kasan_krealloc+0x118/0x178 [ 1523.223178] krealloc_noprof+0x128/0x360 [ 1523.223209] krealloc_less_oob_helper+0x168/0xc50 [ 1523.223242] krealloc_less_oob+0x20/0x38 [ 1523.223271] kunit_try_run_case+0x170/0x3f0 [ 1523.223302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.223339] kthread+0x328/0x630 [ 1523.223362] ret_from_fork+0x10/0x20 [ 1523.223390] [ 1523.223400] The buggy address belongs to the object at ffff000800d21000 [ 1523.223400] which belongs to the cache kmalloc-256 of size 256 [ 1523.223437] The buggy address is located 0 bytes to the right of [ 1523.223437] allocated 201-byte region [ffff000800d21000, ffff000800d210c9) [ 1523.223480] [ 1523.223489] The buggy address belongs to the physical page: [ 1523.223506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20 [ 1523.223539] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1523.223569] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 1523.223601] page_type: f5(slab) [ 1523.223627] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.223661] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.223697] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.223731] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.223766] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff [ 1523.223800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 1523.223825] page dumped because: kasan: bad access detected [ 1523.223843] [ 1523.223852] Memory state around the buggy address: [ 1523.223871] ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.223900] ffff000800d21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1523.223929] >ffff000800d21080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 1523.223952] ^ [ 1523.223974] ffff000800d21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.224003] ffff000800d21180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.224027] ================================================================== [ 1523.224083] ================================================================== [ 1523.224106] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 1523.224141] Write of size 1 at addr ffff000800d210d0 by task kunit_try_catch/229 [ 1523.224173] [ 1523.224187] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.224245] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.224263] Hardware name: ARM Juno development board (r2) (DT) [ 1523.224283] Call trace: [ 1523.224295] show_stack+0x20/0x38 (C) [ 1523.224330] dump_stack_lvl+0x8c/0xd0 [ 1523.224368] print_report+0x118/0x608 [ 1523.224407] kasan_report+0xdc/0x128 [ 1523.224445] __asan_report_store1_noabort+0x20/0x30 [ 1523.224481] krealloc_less_oob_helper+0xb9c/0xc50 [ 1523.224520] krealloc_less_oob+0x20/0x38 [ 1523.224557] kunit_try_run_case+0x170/0x3f0 [ 1523.224594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.224639] kthread+0x328/0x630 [ 1523.224669] ret_from_fork+0x10/0x20 [ 1523.224704] [ 1523.224713] Allocated by task 229: [ 1523.224729] kasan_save_stack+0x3c/0x68 [ 1523.224762] kasan_save_track+0x20/0x40 [ 1523.224793] kasan_save_alloc_info+0x40/0x58 [ 1523.224820] __kasan_krealloc+0x118/0x178 [ 1523.224852] krealloc_noprof+0x128/0x360 [ 1523.224883] krealloc_less_oob_helper+0x168/0xc50 [ 1523.224915] krealloc_less_oob+0x20/0x38 [ 1523.224945] kunit_try_run_case+0x170/0x3f0 [ 1523.224975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.225012] kthread+0x328/0x630 [ 1523.225035] ret_from_fork+0x10/0x20 [ 1523.225064] [ 1523.225073] The buggy address belongs to the object at ffff000800d21000 [ 1523.225073] which belongs to the cache kmalloc-256 of size 256 [ 1523.225110] The buggy address is located 7 bytes to the right of [ 1523.225110] allocated 201-byte region [ffff000800d21000, ffff000800d210c9) [ 1523.225153] [ 1523.225162] The buggy address belongs to the physical page: [ 1523.225180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20 [ 1523.225212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1523.225242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 1523.225274] page_type: f5(slab) [ 1523.225299] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.225333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.225369] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.225403] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.225438] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff [ 1523.225472] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 1523.225498] page dumped because: kasan: bad access detected [ 1523.225516] [ 1523.225524] Memory state around the buggy address: [ 1523.225543] ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.225572] ffff000800d21000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1523.225601] >ffff000800d21080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 1523.225625] ^ [ 1523.225647] ffff000800d21100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.225676] ffff000800d21180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.225700] ================================================================== [ 1523.225726] ================================================================== [ 1523.225747] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 1523.225781] Write of size 1 at addr ffff000800d210da by task kunit_try_catch/229 [ 1523.225813] [ 1523.225827] CPU: 5 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.225884] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.225902] Hardware name: ARM Juno development board (r2) (DT) [ 1523.225922] Call trace: [ 1523.225933] show_stack+0x20/0x38 (C) [ 1523.225968] dump_stack_lvl+0x8c/0xd0 [ 1523.226006] print_report+0x118/0x608 [ 1523.226045] kasan_report+0xdc/0x128 [ 1523.226084] __asan_report_store1_noabort+0x20/0x30 [ 1523.226120] krealloc_less_oob_helper+0xa80/0xc50 [ 1523.226159] krealloc_less_oob+0x20/0x38 [ 1523.226195] kunit_try_run_case+0x170/0x3f0 [ 1523.226232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.226276] kthread+0x328/0x630 [ 1523.226306] ret_from_fork+0x10/0x20 [ 1523.226342] [ 1523.226351] Allocated by task 229: [ 1523.226367] kasan_save_stack+0x3c/0x68 [ 1523.226399] kasan_save_track+0x20/0x40 [ 1523.226430] kasan_save_alloc_info+0x40/0x58 [ 1523.226457] __kasan_krealloc+0x118/0x178 [ 1523.226489] krealloc_noprof+0x128/0x360 [ 1523.226520] krealloc_less_oob_helper+0x168/0xc50 [ 1523.226553] krealloc_less_oob+0x20/0x38 [ 1523.226582] kunit_try_run_case+0x170/0x3f0 [ 1523.226613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.226650] kthread+0x328/0x630 [ 1523.226673] ret_from_fork+0x10/0x20 [ 1523.226702] [ 1523.226711] The buggy address belongs to the object at ffff000800d21000 [ 1523.226711] which belongs to the cache kmalloc-256 of size 256 [ 1523.226748] The buggy address is located 17 bytes to the right of [ 1523.226748] allocated 201-byte region [ffff000800d21000, ffff000800d210c9) [ 1523.226792] [ 1523.226801] The buggy address belongs to the physical page: [ 1523.226818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20 [ 1523.226851] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1523.226881] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 1523.226913] page_type: f5(slab) [ 1523.227419] Write of size 1 at addr ffff000800d210ea by task kunit_try_catch/229 [ 1523.229260] show_stack+0x20/0x38 (C) [ 1523.233303] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.234288] ffff000827892180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 1523.240058] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 1523.246582] [ 1523.251060] kunit_try_run_case+0x170/0x3f0 [ 1523.257650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.273799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1523.289321] kunit_try_run_case+0x170/0x3f0 [ 1523.297919] The buggy address belongs to the object at ffff000827f2f300 [ 1523.297919] which belongs to the cache kmalloc-128 of size 128 [ 1525.271958] The buggy address belongs to the object at ffff000800c03c00 [ 1525.271958] which belongs to the cache kmalloc-128 of size 128 [ 1525.315974] The buggy address is located 1 bytes inside of [ 1525.315974] 128-byte region [ffff000827998100, ffff000827998180) [ 1525.341573] Read of size 1 at addr ffff000827f466d0 by task kunit_try_catch/330 [ 1525.361931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 1525.391784] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 1557.396266] ================================================================== [ 1557.396289] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 1557.396289] [ 1557.396322] Use-after-free read at 0x00000000d0001b62 (in kfence-#95): [ 1557.396337] test_krealloc+0x51c/0x830 [ 1557.396354] kunit_try_run_case+0x170/0x3f0 [ 1557.396370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1557.396387] kthread+0x328/0x630 [ 1557.396398] ret_from_fork+0x10/0x20 [ 1557.396412] [ 1557.396418] kfence-#95: 0x00000000d0001b62-0x0000000066128209, size=32, cache=kmalloc-32 [ 1557.396418] [ 1557.396435] allocated by task 408 on cpu 1 at 1557.396214s (0.000219s ago): [ 1557.396461] test_alloc+0x29c/0x628 [ 1557.396475] test_krealloc+0xc0/0x830 [ 1557.396488] kunit_try_run_case+0x170/0x3f0 [ 1557.396501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1557.396517] kthread+0x328/0x630 [ 1557.396526] ret_from_fork+0x10/0x20 [ 1557.396539] [ 1557.396544] freed by task 408 on cpu 1 at 1557.396231s (0.000312s ago): [ 1557.396568] krealloc_noprof+0x148/0x360 [ 1557.396582] test_krealloc+0x1dc/0x830 [ 1557.396596] kunit_try_run_case+0x170/0x3f0 [ 1557.396609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1557.396624] kthread+0x328/0x630 [ 1557.396634] ret_from_fork+0x10/0x20 [ 1557.396647] [ 1557.396657] CPU: 1 UID: 0 PID: 408 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1557.396685] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1557.396694] Hardware name: ARM Juno development board (r2) (DT) [ 1557.396704] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[ 1568.648093] Internal error: Oops: 0000000096000005 [#1] SMP [ 1568.651608] amba 20010000.etf: deferred probe timeout, ignoring dependency [ 1568.651720] amba 20030000.tpiu: deferred probe timeout, ignoring dependency [ 1568.651828] amba 20040000.funnel: deferred probe timeout, ignoring dependency [ 1568.651934] amba 20070000.etr: deferred probe timeout, ignoring dependency [ 1568.652077] amba 20100000.stm: deferred probe timeout, ignoring dependency [ 1568.652188] amba 20120000.replicator: deferred probe timeout, ignoring dependency [ 1568.652309] amba 22010000.cpu-debug: deferred probe timeout, ignoring dependency [ 1568.652415] amba 22040000.etm: deferred probe timeout, ignoring dependency [ 1568.652520] amba 22020000.cti: deferred probe timeout, ignoring dependency [ 1568.652626] amba 220c0000.funnel: deferred probe timeout, ignoring dependency [ 1568.652731] amba 22110000.cpu-debug: deferred probe timeout, ignoring dependency [ 1568.652836] amba 22140000.etm: deferred probe timeout, ignoring dependency [ 1568.652940] amba 22120000.cti: deferred probe timeout, ignoring dependency [ 1568.653058] amba 23010000.cpu-debug: deferred probe timeout, ignoring dependency [ 1568.653164] amba 23040000.etm: deferred probe timeout, ignoring dependency [ 1568.653267] amba 23020000.cti: deferred probe timeout, ignoring dependency [ 1568.653374] amba 230c0000.funnel: deferred probe timeout, ignoring dependency [ 1568.653478] amba 23110000.cpu-debug: deferred probe timeout, ignoring dependency [ 1568.653583] amba 23140000.etm: deferred probe timeout, ignoring dependency [ 1568.653687] amba 23120000.cti: deferred probe timeout, ignoring dependency [ 1568.653801] amba 23210000.cpu-debug: deferred probe timeout, ignoring dependency [ 1568.653906] amba 23240000.etm: deferred probe timeout, ignoring dependency [ 1568.654011] amba 23220000.cti: deferred probe timeout, ignoring dependency [ 1568.654116] amba 23310000.cpu-debug: deferred probe timeout, ignoring dependency [ 1568.654230] amba 23340000.etm: deferred probe timeout, ignoring dependency [ 1568.654334] amba 23320000.cti: deferred probe timeout, ignoring dependency [ 1568.654438] amba 20020000.cti: deferred probe timeout, ignoring dependency [ 1568.654541] amba 20110000.cti: deferred probe timeout, ignoring dependency [ 1568.654656] amba 20130000.funnel: deferred probe timeout, ignoring dependency [ 1568.654761] amba 20140000.etf: deferred probe timeout, ignoring dependency [ 1568.654866] amba 20150000.funnel: deferred probe timeout, ignoring dependency [ 1568.654970] amba 20160000.cti: deferred probe timeout, ignoring dependency [ 1569.898880] Modules linked in: [ 1569.901987] CPU: 0 UID: 0 PID: 603 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1569.913197] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1569.918280] Hardware name: ARM Juno development board (r2) (DT) [ 1569.924235] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1569.931248] pc : kunit_test_null_dereference+0x70/0x170 [ 1569.936537] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1569.942427] sp : ffff80008a6f7d30 [ 1569.945769] x29: ffff80008a6f7d90 x28: 0000000000000000 x27: 0000000000000000 [ 1569.952992] x26: 1fffe0010443fc61 x25: 0000000000000000 x24: 0000000000000004 [ 1569.960211] x23: ffff0008221fe30c x22: ffff800081229ce8 x21: ffff0008016a4f88 [ 1569.967433] x20: 1ffff000114defa6 x19: ffff800087d07990 x18: 00000000c450c08d [ 1569.974654] x17: ffff8000801fbf3c x16: ffff8000801fbc74 x15: ffff8000811ef080 [ 1569.981876] x14: ffff8000808f8724 x13: 1fffe00126bb4d89 x12: ffff600104c0311c [ 1569.989099] x11: 1fffe00104c0311b x10: ffff600104c0311b x9 : ffff800081221478 [ 1569.996321] x8 : ffff80008a6f7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 1570.003541] x5 : ffff7000114defa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 1570.010761] x2 : dfff800000000000 x1 : ffff000826018000 x0 : ffff800087d07990 [ 1570.017982] Call trace: [ 1570.020453] kunit_test_null_dereference+0x70/0x170 (P) [ 1570.025742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1570.031288] kthread+0x328/0x630 [ 1570.034561] ret_from_fork+0x10/0x20 [ 1570.038200] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 1570.044332] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 1557.124345] ================================================================== [ 1557.124368] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 1557.124368] [ 1557.124402] Use-after-free read at 0x000000003456d764 (in kfence-#93): [ 1557.124418] test_memcache_typesafe_by_rcu+0x280/0x560 [ 1557.124436] kunit_try_run_case+0x170/0x3f0 [ 1557.124452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1557.124469] kthread+0x328/0x630 [ 1557.124480] ret_from_fork+0x10/0x20 [ 1557.124495] [ 1557.124501] kfence-#93: 0x000000003456d764-0x0000000073d6ceb5, size=32, cache=test [ 1557.124501] [ 1557.124516] allocated by task 406 on cpu 1 at 1557.084086s (0.040429s ago): [ 1557.124541] test_alloc+0x230/0x628 [ 1557.124555] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 1557.124571] kunit_try_run_case+0x170/0x3f0 [ 1557.124585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1557.124600] kthread+0x328/0x630 [ 1557.124610] ret_from_fork+0x10/0x20 [ 1557.124622] [ 1557.124627] freed by task 406 on cpu 1 at 1557.084095s (0.040532s ago): [ 1557.124649] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 1557.124665] kunit_try_run_case+0x170/0x3f0 [ 1557.124679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1557.124694] kthread+0x328/0x630 [ 1557.124704] ret_from_fork+0x10/0x20 [ 1557.124717] [ 1557.124727] CPU: 2 UID: 0 PID: 406 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1557.124753] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1557.124761] Hardware name: ARM Juno development board (r2) (DT) [ 1557.124771] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 1532.837607] ================================================================== [ 1532.837639] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 1532.837639] [ 1532.837699] Invalid read at 0x0000000049ef3f7c: [ 1532.837728] test_invalid_access+0xdc/0x1f0 [ 1532.837768] kunit_try_run_case+0x170/0x3f0 [ 1532.837808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1532.837851] kthread+0x328/0x630 [ 1532.837882] ret_from_fork+0x10/0x20 [ 1532.837919] [ 1532.837943] CPU: 3 UID: 0 PID: 402 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1532.838004] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1532.838027] Hardware name: ARM Juno development board (r2) (DT) [ 1532.838052] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 1532.584159] ================================================================== [ 1532.584176] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 1532.584176] [ 1532.584198] Corrupted memory at 0x000000007233c1f2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#89): [ 1532.584268] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 1532.584286] kunit_try_run_case+0x170/0x3f0 [ 1532.584302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1532.584318] kthread+0x328/0x630 [ 1532.584329] ret_from_fork+0x10/0x20 [ 1532.584343] [ 1532.584349] kfence-#89: 0x00000000b4ce457b-0x00000000981974f8, size=73, cache=kmalloc-96 [ 1532.584349] [ 1532.584365] allocated by task 396 on cpu 2 at 1532.584114s (0.000250s ago): [ 1532.584388] test_alloc+0x29c/0x628 [ 1532.584401] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 1532.584416] kunit_try_run_case+0x170/0x3f0 [ 1532.584430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1532.584445] kthread+0x328/0x630 [ 1532.584454] ret_from_fork+0x10/0x20 [ 1532.584467] [ 1532.584472] freed by task 396 on cpu 2 at 1532.584123s (0.000348s ago): [ 1532.584494] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 1532.584510] kunit_try_run_case+0x170/0x3f0 [ 1532.584523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1532.584538] kthread+0x328/0x630 [ 1532.584548] ret_from_fork+0x10/0x20 [ 1532.584560] [ 1532.584570] CPU: 2 UID: 0 PID: 396 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1532.584597] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1532.584605] Hardware name: ARM Juno development board (r2) (DT) [ 1532.584615] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 1532.368327] ================================================================== [ 1532.368344] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 1532.368344] [ 1532.368378] Out-of-bounds read at 0x00000000d36c7839 (105B right of kfence-#87): [ 1532.368395] test_kmalloc_aligned_oob_read+0x238/0x468 [ 1532.368414] kunit_try_run_case+0x170/0x3f0 [ 1532.368430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1532.368447] kthread+0x328/0x630 [ 1532.368458] ret_from_fork+0x10/0x20 [ 1532.368472] [ 1532.368477] kfence-#87: 0x000000001e74634e-0x00000000849107ed, size=73, cache=kmalloc-96 [ 1532.368477] [ 1532.368494] allocated by task 394 on cpu 2 at 1532.368305s (0.000188s ago): [ 1532.368519] test_alloc+0x29c/0x628 [ 1532.368533] test_kmalloc_aligned_oob_read+0x100/0x468 [ 1532.368548] kunit_try_run_case+0x170/0x3f0 [ 1532.368562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1532.368577] kthread+0x328/0x630 [ 1532.368586] ret_from_fork+0x10/0x20 [ 1532.368599] [ 1532.368609] CPU: 2 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1532.368635] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1532.368644] Hardware name: ARM Juno development board (r2) (DT) [ 1532.368653] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 1527.740544] ================================================================== [ 1527.740558] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 1527.740558] [ 1527.740577] Corrupted memory at 0x000000006229cae2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#45): [ 1527.740647] test_corruption+0x278/0x378 [ 1527.740663] kunit_try_run_case+0x170/0x3f0 [ 1527.740678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.740693] kthread+0x328/0x630 [ 1527.740703] ret_from_fork+0x10/0x20 [ 1527.740716] [ 1527.740721] kfence-#45: 0x00000000516f0b0f-0x00000000714b4d81, size=32, cache=kmalloc-32 [ 1527.740721] [ 1527.740737] allocated by task 382 on cpu 2 at 1527.740514s (0.000222s ago): [ 1527.740759] test_alloc+0x29c/0x628 [ 1527.740773] test_corruption+0xdc/0x378 [ 1527.740787] kunit_try_run_case+0x170/0x3f0 [ 1527.740800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.740815] kthread+0x328/0x630 [ 1527.740825] ret_from_fork+0x10/0x20 [ 1527.740837] [ 1527.740842] freed by task 382 on cpu 2 at 1527.740522s (0.000319s ago): [ 1527.740865] test_corruption+0x278/0x378 [ 1527.740879] kunit_try_run_case+0x170/0x3f0 [ 1527.740892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.740907] kthread+0x328/0x630 [ 1527.740916] ret_from_fork+0x10/0x20 [ 1527.740928] [ 1527.740936] CPU: 2 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1527.740962] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1527.740970] Hardware name: ARM Juno development board (r2) (DT) [ 1527.740979] ================================================================== [ 1528.160154] ================================================================== [ 1528.160166] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 1528.160166] [ 1528.160185] Corrupted memory at 0x000000002392782f [ ! ] (in kfence-#32): [ 1528.160211] test_corruption+0x1d8/0x378 [ 1528.160227] kunit_try_run_case+0x170/0x3f0 [ 1528.160242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1528.160257] kthread+0x328/0x630 [ 1528.160268] ret_from_fork+0x10/0x20 [ 1528.160281] [ 1528.160287] kfence-#32: 0x00000000a438bee4-0x000000007c12f73c, size=32, cache=test [ 1528.160287] [ 1528.160301] allocated by task 384 on cpu 2 at 1528.160118s (0.000182s ago): [ 1528.160323] test_alloc+0x230/0x628 [ 1528.160337] test_corruption+0x198/0x378 [ 1528.160350] kunit_try_run_case+0x170/0x3f0 [ 1528.160363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1528.160378] kthread+0x328/0x630 [ 1528.160388] ret_from_fork+0x10/0x20 [ 1528.160400] [ 1528.160405] freed by task 384 on cpu 2 at 1528.160126s (0.000278s ago): [ 1528.160428] test_corruption+0x1d8/0x378 [ 1528.160442] kunit_try_run_case+0x170/0x3f0 [ 1528.160455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1528.160470] kthread+0x328/0x630 [ 1528.160479] ret_from_fork+0x10/0x20 [ 1528.160492] [ 1528.160499] CPU: 2 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1528.160524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1528.160532] Hardware name: ARM Juno development board (r2) (DT) [ 1528.160541] ================================================================== [ 1528.056262] ================================================================== [ 1528.056276] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 1528.056276] [ 1528.056295] Corrupted memory at 0x00000000611fb4e2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#47): [ 1528.056364] test_corruption+0x120/0x378 [ 1528.056381] kunit_try_run_case+0x170/0x3f0 [ 1528.056395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1528.056411] kthread+0x328/0x630 [ 1528.056422] ret_from_fork+0x10/0x20 [ 1528.056435] [ 1528.056441] kfence-#47: 0x000000002490e9ee-0x0000000076717044, size=32, cache=test [ 1528.056441] [ 1528.056457] allocated by task 384 on cpu 2 at 1528.056227s (0.000229s ago): [ 1528.056479] test_alloc+0x230/0x628 [ 1528.056493] test_corruption+0xdc/0x378 [ 1528.056507] kunit_try_run_case+0x170/0x3f0 [ 1528.056520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1528.056535] kthread+0x328/0x630 [ 1528.056545] ret_from_fork+0x10/0x20 [ 1528.056557] [ 1528.056562] freed by task 384 on cpu 2 at 1528.056236s (0.000325s ago): [ 1528.056586] test_corruption+0x120/0x378 [ 1528.056600] kunit_try_run_case+0x170/0x3f0 [ 1528.056613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1528.056628] kthread+0x328/0x630 [ 1528.056638] ret_from_fork+0x10/0x20 [ 1528.056650] [ 1528.056659] CPU: 2 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1528.056685] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1528.056693] Hardware name: ARM Juno development board (r2) (DT) [ 1528.056702] ================================================================== [ 1527.953616] ================================================================== [ 1527.953633] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 1527.953633] [ 1527.953653] Corrupted memory at 0x0000000032ddad88 [ ! ] (in kfence-#2): [ 1527.953679] test_corruption+0x284/0x378 [ 1527.953695] kunit_try_run_case+0x170/0x3f0 [ 1527.953711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.953726] kthread+0x328/0x630 [ 1527.953738] ret_from_fork+0x10/0x20 [ 1527.953752] [ 1527.953757] kfence-#2: 0x0000000082e54077-0x0000000070523a65, size=32, cache=kmalloc-32 [ 1527.953757] [ 1527.953772] allocated by task 382 on cpu 2 at 1527.953571s (0.000200s ago): [ 1527.953794] test_alloc+0x29c/0x628 [ 1527.953808] test_corruption+0x198/0x378 [ 1527.953821] kunit_try_run_case+0x170/0x3f0 [ 1527.953835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.953850] kthread+0x328/0x630 [ 1527.953859] ret_from_fork+0x10/0x20 [ 1527.953871] [ 1527.953876] freed by task 382 on cpu 2 at 1527.953579s (0.000295s ago): [ 1527.953898] test_corruption+0x284/0x378 [ 1527.953912] kunit_try_run_case+0x170/0x3f0 [ 1527.953925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.953940] kthread+0x328/0x630 [ 1527.953950] ret_from_fork+0x10/0x20 [ 1527.953962] [ 1527.953972] CPU: 2 UID: 0 PID: 382 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1527.953997] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1527.954005] Hardware name: ARM Juno development board (r2) (DT) [ 1527.954014] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 1527.638983] ================================================================== [ 1527.638998] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 1527.638998] [ 1527.639018] Invalid free of 0x000000007590cb6d (in kfence-#44): [ 1527.639032] test_invalid_addr_free+0xec/0x238 [ 1527.639048] kunit_try_run_case+0x170/0x3f0 [ 1527.639064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.639080] kthread+0x328/0x630 [ 1527.639090] ret_from_fork+0x10/0x20 [ 1527.639104] [ 1527.639110] kfence-#44: 0x000000007ad76db6-0x00000000a3a9f3ef, size=32, cache=test [ 1527.639110] [ 1527.639126] allocated by task 380 on cpu 2 at 1527.638955s (0.000170s ago): [ 1527.639149] test_alloc+0x230/0x628 [ 1527.639163] test_invalid_addr_free+0xd4/0x238 [ 1527.639177] kunit_try_run_case+0x170/0x3f0 [ 1527.639190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.639206] kthread+0x328/0x630 [ 1527.639216] ret_from_fork+0x10/0x20 [ 1527.639228] [ 1527.639237] CPU: 2 UID: 0 PID: 380 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1527.639263] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1527.639271] Hardware name: ARM Juno development board (r2) (DT) [ 1527.639280] ================================================================== [ 1527.532152] ================================================================== [ 1527.532165] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 1527.532165] [ 1527.532184] Invalid free of 0x0000000012c7cbed (in kfence-#43): [ 1527.532198] test_invalid_addr_free+0x1ac/0x238 [ 1527.532214] kunit_try_run_case+0x170/0x3f0 [ 1527.532229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.532245] kthread+0x328/0x630 [ 1527.532256] ret_from_fork+0x10/0x20 [ 1527.532269] [ 1527.532275] kfence-#43: 0x000000003f7b4d01-0x0000000039e8cc35, size=32, cache=kmalloc-32 [ 1527.532275] [ 1527.532290] allocated by task 378 on cpu 2 at 1527.532129s (0.000160s ago): [ 1527.532313] test_alloc+0x29c/0x628 [ 1527.532327] test_invalid_addr_free+0xd4/0x238 [ 1527.532341] kunit_try_run_case+0x170/0x3f0 [ 1527.532354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.532370] kthread+0x328/0x630 [ 1527.532379] ret_from_fork+0x10/0x20 [ 1527.532392] [ 1527.532400] CPU: 2 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1527.532426] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1527.532433] Hardware name: ARM Juno development board (r2) (DT) [ 1527.532442] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 1527.328164] ================================================================== [ 1527.328178] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 1527.328178] [ 1527.328198] Invalid free of 0x00000000acaf80ad (in kfence-#41): [ 1527.328213] test_double_free+0x1bc/0x238 [ 1527.328230] kunit_try_run_case+0x170/0x3f0 [ 1527.328246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.328261] kthread+0x328/0x630 [ 1527.328273] ret_from_fork+0x10/0x20 [ 1527.328287] [ 1527.328292] kfence-#41: 0x00000000acaf80ad-0x0000000070a0fc0b, size=32, cache=kmalloc-32 [ 1527.328292] [ 1527.328308] allocated by task 374 on cpu 2 at 1527.328122s (0.000184s ago): [ 1527.328331] test_alloc+0x29c/0x628 [ 1527.328345] test_double_free+0xd4/0x238 [ 1527.328359] kunit_try_run_case+0x170/0x3f0 [ 1527.328373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.328388] kthread+0x328/0x630 [ 1527.328397] ret_from_fork+0x10/0x20 [ 1527.328410] [ 1527.328415] freed by task 374 on cpu 2 at 1527.328131s (0.000283s ago): [ 1527.328437] test_double_free+0x1ac/0x238 [ 1527.328452] kunit_try_run_case+0x170/0x3f0 [ 1527.328465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.328480] kthread+0x328/0x630 [ 1527.328490] ret_from_fork+0x10/0x20 [ 1527.328502] [ 1527.328511] CPU: 2 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1527.328537] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1527.328545] Hardware name: ARM Juno development board (r2) (DT) [ 1527.328555] ================================================================== [ 1527.428185] ================================================================== [ 1527.428200] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 1527.428200] [ 1527.428220] Invalid free of 0x00000000112ceba9 (in kfence-#42): [ 1527.428234] test_double_free+0x100/0x238 [ 1527.428251] kunit_try_run_case+0x170/0x3f0 [ 1527.428266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.428282] kthread+0x328/0x630 [ 1527.428293] ret_from_fork+0x10/0x20 [ 1527.428306] [ 1527.428312] kfence-#42: 0x00000000112ceba9-0x000000007a0c2341, size=32, cache=test [ 1527.428312] [ 1527.428328] allocated by task 376 on cpu 2 at 1527.428145s (0.000182s ago): [ 1527.428351] test_alloc+0x230/0x628 [ 1527.428366] test_double_free+0xd4/0x238 [ 1527.428380] kunit_try_run_case+0x170/0x3f0 [ 1527.428393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.428409] kthread+0x328/0x630 [ 1527.428419] ret_from_fork+0x10/0x20 [ 1527.428431] [ 1527.428436] freed by task 376 on cpu 2 at 1527.428153s (0.000282s ago): [ 1527.428460] test_double_free+0xf0/0x238 [ 1527.428475] kunit_try_run_case+0x170/0x3f0 [ 1527.428488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.428503] kthread+0x328/0x630 [ 1527.428513] ret_from_fork+0x10/0x20 [ 1527.428526] [ 1527.428534] CPU: 2 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1527.428560] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1527.428568] Hardware name: ARM Juno development board (r2) (DT) [ 1527.428578] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 1526.904171] ================================================================== [ 1526.904185] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 1526.904185] [ 1526.904211] Use-after-free read at 0x000000006fe7c169 (in kfence-#36): [ 1526.904224] test_use_after_free_read+0x114/0x248 [ 1526.904242] kunit_try_run_case+0x170/0x3f0 [ 1526.904257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.904272] kthread+0x328/0x630 [ 1526.904282] ret_from_fork+0x10/0x20 [ 1526.904295] [ 1526.904301] kfence-#36: 0x000000006fe7c169-0x000000002600da61, size=32, cache=kmalloc-32 [ 1526.904301] [ 1526.904316] allocated by task 366 on cpu 2 at 1526.904146s (0.000170s ago): [ 1526.904339] test_alloc+0x29c/0x628 [ 1526.904353] test_use_after_free_read+0xd0/0x248 [ 1526.904368] kunit_try_run_case+0x170/0x3f0 [ 1526.904381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.904396] kthread+0x328/0x630 [ 1526.904406] ret_from_fork+0x10/0x20 [ 1526.904418] [ 1526.904423] freed by task 366 on cpu 2 at 1526.904153s (0.000268s ago): [ 1526.904446] test_use_after_free_read+0x1c0/0x248 [ 1526.904461] kunit_try_run_case+0x170/0x3f0 [ 1526.904474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.904489] kthread+0x328/0x630 [ 1526.904498] ret_from_fork+0x10/0x20 [ 1526.904511] [ 1526.904518] CPU: 2 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1526.904544] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1526.904551] Hardware name: ARM Juno development board (r2) (DT) [ 1526.904560] ================================================================== [ 1527.008144] ================================================================== [ 1527.008159] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 1527.008159] [ 1527.008187] Use-after-free read at 0x00000000187f2aa1 (in kfence-#37): [ 1527.008202] test_use_after_free_read+0x114/0x248 [ 1527.008218] kunit_try_run_case+0x170/0x3f0 [ 1527.008233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.008249] kthread+0x328/0x630 [ 1527.008259] ret_from_fork+0x10/0x20 [ 1527.008273] [ 1527.008279] kfence-#37: 0x00000000187f2aa1-0x000000003fb99b1b, size=32, cache=test [ 1527.008279] [ 1527.008294] allocated by task 368 on cpu 2 at 1527.008116s (0.000177s ago): [ 1527.008318] test_alloc+0x230/0x628 [ 1527.008332] test_use_after_free_read+0xd0/0x248 [ 1527.008346] kunit_try_run_case+0x170/0x3f0 [ 1527.008359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.008374] kthread+0x328/0x630 [ 1527.008384] ret_from_fork+0x10/0x20 [ 1527.008396] [ 1527.008401] freed by task 368 on cpu 2 at 1527.008124s (0.000275s ago): [ 1527.008424] test_use_after_free_read+0xf0/0x248 [ 1527.008439] kunit_try_run_case+0x170/0x3f0 [ 1527.008451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1527.008466] kthread+0x328/0x630 [ 1527.008476] ret_from_fork+0x10/0x20 [ 1527.008488] [ 1527.008497] CPU: 2 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1527.008523] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1527.008531] Hardware name: ARM Juno development board (r2) (DT) [ 1527.008541] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 1526.692161] ================================================================== [ 1526.692182] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 1526.692182] [ 1526.692215] Out-of-bounds write at 0x00000000d6fddde9 (1B left of kfence-#34): [ 1526.692232] test_out_of_bounds_write+0x100/0x240 [ 1526.692250] kunit_try_run_case+0x170/0x3f0 [ 1526.692265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.692282] kthread+0x328/0x630 [ 1526.692293] ret_from_fork+0x10/0x20 [ 1526.692308] [ 1526.692314] kfence-#34: 0x00000000fb601f2e-0x00000000d780c8a6, size=32, cache=kmalloc-32 [ 1526.692314] [ 1526.692330] allocated by task 362 on cpu 2 at 1526.692139s (0.000190s ago): [ 1526.692356] test_alloc+0x29c/0x628 [ 1526.692371] test_out_of_bounds_write+0xc8/0x240 [ 1526.692385] kunit_try_run_case+0x170/0x3f0 [ 1526.692399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.692414] kthread+0x328/0x630 [ 1526.692423] ret_from_fork+0x10/0x20 [ 1526.692436] [ 1526.692446] CPU: 2 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1526.692473] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1526.692480] Hardware name: ARM Juno development board (r2) (DT) [ 1526.692490] ================================================================== [ 1526.797283] ================================================================== [ 1526.797298] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 1526.797298] [ 1526.797327] Out-of-bounds write at 0x00000000fe9e8847 (1B left of kfence-#35): [ 1526.797345] test_out_of_bounds_write+0x100/0x240 [ 1526.797363] kunit_try_run_case+0x170/0x3f0 [ 1526.797378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.797394] kthread+0x328/0x630 [ 1526.797405] ret_from_fork+0x10/0x20 [ 1526.797418] [ 1526.797424] kfence-#35: 0x000000007f8b20a9-0x00000000669426b3, size=32, cache=test [ 1526.797424] [ 1526.797440] allocated by task 364 on cpu 2 at 1526.797265s (0.000174s ago): [ 1526.797465] test_alloc+0x230/0x628 [ 1526.797479] test_out_of_bounds_write+0xc8/0x240 [ 1526.797494] kunit_try_run_case+0x170/0x3f0 [ 1526.797507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.797522] kthread+0x328/0x630 [ 1526.797532] ret_from_fork+0x10/0x20 [ 1526.797545] [ 1526.797554] CPU: 2 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1526.797580] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1526.797588] Hardware name: ARM Juno development board (r2) (DT) [ 1526.797598] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 1526.487258] ================================================================== [ 1526.487276] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 1526.487276] [ 1526.487306] Out-of-bounds read at 0x00000000523f7b63 (32B right of kfence-#31): [ 1526.487323] test_out_of_bounds_read+0x1c8/0x3e0 [ 1526.487339] kunit_try_run_case+0x170/0x3f0 [ 1526.487355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.487371] kthread+0x328/0x630 [ 1526.487382] ret_from_fork+0x10/0x20 [ 1526.487396] [ 1526.487401] kfence-#31: 0x0000000001cf8d90-0x00000000b4c5772c, size=32, cache=test [ 1526.487401] [ 1526.487417] allocated by task 360 on cpu 2 at 1526.487238s (0.000177s ago): [ 1526.487441] test_alloc+0x230/0x628 [ 1526.487455] test_out_of_bounds_read+0x198/0x3e0 [ 1526.487470] kunit_try_run_case+0x170/0x3f0 [ 1526.487483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.487498] kthread+0x328/0x630 [ 1526.487507] ret_from_fork+0x10/0x20 [ 1526.487520] [ 1526.487530] CPU: 2 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1526.487555] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1526.487563] Hardware name: ARM Juno development board (r2) (DT) [ 1526.487573] ================================================================== [ 1525.540173] ================================================================== [ 1525.540202] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 1525.540202] [ 1525.540257] Out-of-bounds read at 0x00000000f4ce04cc (1B left of kfence-#6): [ 1525.540291] test_out_of_bounds_read+0x114/0x3e0 [ 1525.540329] kunit_try_run_case+0x170/0x3f0 [ 1525.540363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.540402] kthread+0x328/0x630 [ 1525.540428] ret_from_fork+0x10/0x20 [ 1525.540460] [ 1525.540473] kfence-#6: 0x00000000d7b483ff-0x00000000077883c2, size=32, cache=kmalloc-32 [ 1525.540473] [ 1525.540507] allocated by task 358 on cpu 0 at 1525.540136s (0.000369s ago): [ 1525.540558] test_alloc+0x29c/0x628 [ 1525.540590] test_out_of_bounds_read+0xdc/0x3e0 [ 1525.540625] kunit_try_run_case+0x170/0x3f0 [ 1525.540656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.540694] kthread+0x328/0x630 [ 1525.540718] ret_from_fork+0x10/0x20 [ 1525.540747] [ 1525.540765] CPU: 0 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.540819] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.540838] Hardware name: ARM Juno development board (r2) (DT) [ 1525.540859] ================================================================== [ 1526.168379] ================================================================== [ 1526.168399] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 1526.168399] [ 1526.168431] Out-of-bounds read at 0x00000000d5c9cd98 (1B left of kfence-#20): [ 1526.168448] test_out_of_bounds_read+0x114/0x3e0 [ 1526.168465] kunit_try_run_case+0x170/0x3f0 [ 1526.168481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.168497] kthread+0x328/0x630 [ 1526.168508] ret_from_fork+0x10/0x20 [ 1526.168522] [ 1526.168528] kfence-#20: 0x00000000c92d846a-0x00000000d8fe91ed, size=32, cache=test [ 1526.168528] [ 1526.168544] allocated by task 360 on cpu 2 at 1526.168358s (0.000185s ago): [ 1526.168569] test_alloc+0x230/0x628 [ 1526.168583] test_out_of_bounds_read+0xdc/0x3e0 [ 1526.168598] kunit_try_run_case+0x170/0x3f0 [ 1526.168610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1526.168626] kthread+0x328/0x630 [ 1526.168635] ret_from_fork+0x10/0x20 [ 1526.168648] [ 1526.168658] CPU: 2 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1526.168684] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1526.168692] Hardware name: ARM Juno development board (r2) (DT) [ 1526.168702] ================================================================== [ 1525.752128] ================================================================== [ 1525.752144] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 1525.752144] [ 1525.752173] Out-of-bounds read at 0x00000000220a224c (32B right of kfence-#14): [ 1525.752190] test_out_of_bounds_read+0x1c8/0x3e0 [ 1525.752207] kunit_try_run_case+0x170/0x3f0 [ 1525.752222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.752238] kthread+0x328/0x630 [ 1525.752249] ret_from_fork+0x10/0x20 [ 1525.752263] [ 1525.752268] kfence-#14: 0x00000000b1cb7f10-0x0000000020860be1, size=32, cache=kmalloc-32 [ 1525.752268] [ 1525.752284] allocated by task 358 on cpu 2 at 1525.752108s (0.000174s ago): [ 1525.752309] test_alloc+0x29c/0x628 [ 1525.752322] test_out_of_bounds_read+0x198/0x3e0 [ 1525.752337] kunit_try_run_case+0x170/0x3f0 [ 1525.752350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.752365] kthread+0x328/0x630 [ 1525.752375] ret_from_fork+0x10/0x20 [ 1525.752387] [ 1525.752397] CPU: 2 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.752422] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.752430] Hardware name: ARM Juno development board (r2) (DT) [ 1525.752440] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 1525.470259] ================================================================== [ 1525.470283] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 1525.470317] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356 [ 1525.470352] [ 1525.470367] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.470429] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.470449] Hardware name: ARM Juno development board (r2) (DT) [ 1525.470471] Call trace: [ 1525.470483] show_stack+0x20/0x38 (C) [ 1525.470520] dump_stack_lvl+0x8c/0xd0 [ 1525.470560] print_report+0x118/0x608 [ 1525.470601] kasan_report+0xdc/0x128 [ 1525.470642] kasan_check_range+0x100/0x1a8 [ 1525.470684] __kasan_check_write+0x20/0x30 [ 1525.470721] strncpy_from_user+0x3c/0x2a0 [ 1525.470758] copy_user_test_oob+0x5c0/0xec8 [ 1525.470800] kunit_try_run_case+0x170/0x3f0 [ 1525.470839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.470885] kthread+0x328/0x630 [ 1525.470917] ret_from_fork+0x10/0x20 [ 1525.470955] [ 1525.470965] Allocated by task 356: [ 1525.470983] kasan_save_stack+0x3c/0x68 [ 1525.471017] kasan_save_track+0x20/0x40 [ 1525.471050] kasan_save_alloc_info+0x40/0x58 [ 1525.471079] __kasan_kmalloc+0xd4/0xd8 [ 1525.471112] __kmalloc_noprof+0x198/0x4c8 [ 1525.471145] kunit_kmalloc_array+0x34/0x88 [ 1525.471177] copy_user_test_oob+0xac/0xec8 [ 1525.471209] kunit_try_run_case+0x170/0x3f0 [ 1525.471242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.471280] kthread+0x328/0x630 [ 1525.471304] ret_from_fork+0x10/0x20 [ 1525.471335] [ 1525.471346] The buggy address belongs to the object at ffff000827f2f500 [ 1525.471346] which belongs to the cache kmalloc-128 of size 128 [ 1525.471385] The buggy address is located 0 bytes inside of [ 1525.471385] allocated 120-byte region [ffff000827f2f500, ffff000827f2f578) [ 1525.471430] [ 1525.471440] The buggy address belongs to the physical page: [ 1525.471458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.471493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.471525] page_type: f5(slab) [ 1525.471552] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.471588] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.471615] page dumped because: kasan: bad access detected [ 1525.471635] [ 1525.471644] Memory state around the buggy address: [ 1525.471665] ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.471695] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.471726] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.471751] ^ [ 1525.471779] ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.471809] ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.471835] ================================================================== [ 1525.471864] ================================================================== [ 1525.471886] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 1525.471920] Write of size 1 at addr ffff000827f2f578 by task kunit_try_catch/356 [ 1525.471955] [ 1525.471970] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.472031] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.472051] Hardware name: ARM Juno development board (r2) (DT) [ 1525.472073] Call trace: [ 1525.472085] show_stack+0x20/0x38 (C) [ 1525.472122] dump_stack_lvl+0x8c/0xd0 [ 1525.472162] print_report+0x118/0x608 [ 1525.472204] kasan_report+0xdc/0x128 [ 1525.472244] __asan_report_store1_noabort+0x20/0x30 [ 1525.472282] strncpy_from_user+0x270/0x2a0 [ 1525.472320] copy_user_test_oob+0x5c0/0xec8 [ 1525.472361] kunit_try_run_case+0x170/0x3f0 [ 1525.472400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.472447] kthread+0x328/0x630 [ 1525.472479] ret_from_fork+0x10/0x20 [ 1525.472516] [ 1525.472527] Allocated by task 356: [ 1525.472545] kasan_save_stack+0x3c/0x68 [ 1525.472579] kasan_save_track+0x20/0x40 [ 1525.472612] kasan_save_alloc_info+0x40/0x58 [ 1525.472641] __kasan_kmalloc+0xd4/0xd8 [ 1525.472674] __kmalloc_noprof+0x198/0x4c8 [ 1525.472707] kunit_kmalloc_array+0x34/0x88 [ 1525.472738] copy_user_test_oob+0xac/0xec8 [ 1525.472771] kunit_try_run_case+0x170/0x3f0 [ 1525.472803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.472841] kthread+0x328/0x630 [ 1525.472865] ret_from_fork+0x10/0x20 [ 1525.472896] [ 1525.472906] The buggy address belongs to the object at ffff000827f2f500 [ 1525.472906] which belongs to the cache kmalloc-128 of size 128 [ 1525.472946] The buggy address is located 0 bytes to the right of [ 1525.472946] allocated 120-byte region [ffff000827f2f500, ffff000827f2f578) [ 1525.472992] [ 1525.473002] The buggy address belongs to the physical page: [ 1525.473021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.473056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.473088] page_type: f5(slab) [ 1525.473114] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.473150] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.473178] page dumped because: kasan: bad access detected [ 1525.473197] [ 1525.473207] Memory state around the buggy address: [ 1525.473228] ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.473258] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.473289] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.473314] ^ [ 1525.473341] ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.473372] ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.473398] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 1525.467090] ================================================================== [ 1525.467113] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 1525.467150] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356 [ 1525.467183] [ 1525.467198] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.467259] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.467279] Hardware name: ARM Juno development board (r2) (DT) [ 1525.467302] Call trace: [ 1525.467314] show_stack+0x20/0x38 (C) [ 1525.467351] dump_stack_lvl+0x8c/0xd0 [ 1525.467390] print_report+0x118/0x608 [ 1525.467431] kasan_report+0xdc/0x128 [ 1525.467471] kasan_check_range+0x100/0x1a8 [ 1525.467514] __kasan_check_write+0x20/0x30 [ 1525.467550] copy_user_test_oob+0x434/0xec8 [ 1525.467589] kunit_try_run_case+0x170/0x3f0 [ 1525.467629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.467676] kthread+0x328/0x630 [ 1525.467708] ret_from_fork+0x10/0x20 [ 1525.467745] [ 1525.467755] Allocated by task 356: [ 1525.467773] kasan_save_stack+0x3c/0x68 [ 1525.467808] kasan_save_track+0x20/0x40 [ 1525.467842] kasan_save_alloc_info+0x40/0x58 [ 1525.467871] __kasan_kmalloc+0xd4/0xd8 [ 1525.467904] __kmalloc_noprof+0x198/0x4c8 [ 1525.467937] kunit_kmalloc_array+0x34/0x88 [ 1525.467968] copy_user_test_oob+0xac/0xec8 [ 1525.468002] kunit_try_run_case+0x170/0x3f0 [ 1525.468034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.468074] kthread+0x328/0x630 [ 1525.468098] ret_from_fork+0x10/0x20 [ 1525.468127] [ 1525.468138] The buggy address belongs to the object at ffff000827f2f500 [ 1525.468138] which belongs to the cache kmalloc-128 of size 128 [ 1525.468177] The buggy address is located 0 bytes inside of [ 1525.468177] allocated 120-byte region [ffff000827f2f500, ffff000827f2f578) [ 1525.468221] [ 1525.468232] The buggy address belongs to the physical page: [ 1525.468251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.468286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.468317] page_type: f5(slab) [ 1525.468344] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.468380] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.468408] page dumped because: kasan: bad access detected [ 1525.468427] [ 1525.468437] Memory state around the buggy address: [ 1525.468457] ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.468488] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.468519] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.468545] ^ [ 1525.468572] ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.468603] ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.468629] ================================================================== [ 1525.468686] ================================================================== [ 1525.468712] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 1525.468748] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356 [ 1525.468783] [ 1525.468798] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.468859] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.468879] Hardware name: ARM Juno development board (r2) (DT) [ 1525.468902] Call trace: [ 1525.468914] show_stack+0x20/0x38 (C) [ 1525.468952] dump_stack_lvl+0x8c/0xd0 [ 1525.468991] print_report+0x118/0x608 [ 1525.469031] kasan_report+0xdc/0x128 [ 1525.469072] kasan_check_range+0x100/0x1a8 [ 1525.469115] __kasan_check_read+0x20/0x30 [ 1525.469150] copy_user_test_oob+0x4a0/0xec8 [ 1525.469191] kunit_try_run_case+0x170/0x3f0 [ 1525.469231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.469278] kthread+0x328/0x630 [ 1525.469309] ret_from_fork+0x10/0x20 [ 1525.469346] [ 1525.469357] Allocated by task 356: [ 1525.469375] kasan_save_stack+0x3c/0x68 [ 1525.469410] kasan_save_track+0x20/0x40 [ 1525.469442] kasan_save_alloc_info+0x40/0x58 [ 1525.469471] __kasan_kmalloc+0xd4/0xd8 [ 1525.469503] __kmalloc_noprof+0x198/0x4c8 [ 1525.469536] kunit_kmalloc_array+0x34/0x88 [ 1525.469568] copy_user_test_oob+0xac/0xec8 [ 1525.469602] kunit_try_run_case+0x170/0x3f0 [ 1525.469635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.469673] kthread+0x328/0x630 [ 1525.469697] ret_from_fork+0x10/0x20 [ 1525.469727] [ 1525.469738] The buggy address belongs to the object at ffff000827f2f500 [ 1525.469738] which belongs to the cache kmalloc-128 of size 128 [ 1525.469778] The buggy address is located 0 bytes inside of [ 1525.469778] allocated 120-byte region [ffff000827f2f500, ffff000827f2f578) [ 1525.469822] [ 1525.469833] The buggy address belongs to the physical page: [ 1525.469851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.469886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.469918] page_type: f5(slab) [ 1525.469944] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.469981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.470008] page dumped because: kasan: bad access detected [ 1525.470028] [ 1525.470038] Memory state around the buggy address: [ 1525.470059] ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.470090] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.470120] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.470146] ^ [ 1525.470173] ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.470203] ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.470229] ================================================================== [ 1525.465519] ================================================================== [ 1525.465545] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 1525.465582] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356 [ 1525.465617] [ 1525.465632] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.465692] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.465712] Hardware name: ARM Juno development board (r2) (DT) [ 1525.465734] Call trace: [ 1525.465747] show_stack+0x20/0x38 (C) [ 1525.465784] dump_stack_lvl+0x8c/0xd0 [ 1525.465824] print_report+0x118/0x608 [ 1525.465865] kasan_report+0xdc/0x128 [ 1525.465904] kasan_check_range+0x100/0x1a8 [ 1525.465948] __kasan_check_read+0x20/0x30 [ 1525.465983] copy_user_test_oob+0x3c8/0xec8 [ 1525.466023] kunit_try_run_case+0x170/0x3f0 [ 1525.466063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.466109] kthread+0x328/0x630 [ 1525.466141] ret_from_fork+0x10/0x20 [ 1525.466179] [ 1525.466190] Allocated by task 356: [ 1525.466208] kasan_save_stack+0x3c/0x68 [ 1525.466242] kasan_save_track+0x20/0x40 [ 1525.466275] kasan_save_alloc_info+0x40/0x58 [ 1525.466304] __kasan_kmalloc+0xd4/0xd8 [ 1525.466335] __kmalloc_noprof+0x198/0x4c8 [ 1525.466369] kunit_kmalloc_array+0x34/0x88 [ 1525.466401] copy_user_test_oob+0xac/0xec8 [ 1525.466435] kunit_try_run_case+0x170/0x3f0 [ 1525.466467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.466507] kthread+0x328/0x630 [ 1525.466532] ret_from_fork+0x10/0x20 [ 1525.466562] [ 1525.466572] The buggy address belongs to the object at ffff000827f2f500 [ 1525.466572] which belongs to the cache kmalloc-128 of size 128 [ 1525.466611] The buggy address is located 0 bytes inside of [ 1525.466611] allocated 120-byte region [ffff000827f2f500, ffff000827f2f578) [ 1525.466655] [ 1525.466666] The buggy address belongs to the physical page: [ 1525.466684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.466720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.466751] page_type: f5(slab) [ 1525.466777] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.466813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.466841] page dumped because: kasan: bad access detected [ 1525.466862] [ 1525.466872] Memory state around the buggy address: [ 1525.466891] ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.466922] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.466952] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.466978] ^ [ 1525.467006] ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.467036] ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.467062] ================================================================== [ 1525.460458] ================================================================== [ 1525.460487] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 1525.460527] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356 [ 1525.460562] [ 1525.460577] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.460638] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.460658] Hardware name: ARM Juno development board (r2) (DT) [ 1525.460681] Call trace: [ 1525.460693] show_stack+0x20/0x38 (C) [ 1525.460732] dump_stack_lvl+0x8c/0xd0 [ 1525.460772] print_report+0x118/0x608 [ 1525.460814] kasan_report+0xdc/0x128 [ 1525.460854] kasan_check_range+0x100/0x1a8 [ 1525.460898] __kasan_check_write+0x20/0x30 [ 1525.460933] copy_user_test_oob+0x234/0xec8 [ 1525.460973] kunit_try_run_case+0x170/0x3f0 [ 1525.461013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.461060] kthread+0x328/0x630 [ 1525.461092] ret_from_fork+0x10/0x20 [ 1525.461131] [ 1525.461142] Allocated by task 356: [ 1525.461160] kasan_save_stack+0x3c/0x68 [ 1525.461196] kasan_save_track+0x20/0x40 [ 1525.461229] kasan_save_alloc_info+0x40/0x58 [ 1525.461258] __kasan_kmalloc+0xd4/0xd8 [ 1525.461291] __kmalloc_noprof+0x198/0x4c8 [ 1525.461324] kunit_kmalloc_array+0x34/0x88 [ 1525.461357] copy_user_test_oob+0xac/0xec8 [ 1525.461390] kunit_try_run_case+0x170/0x3f0 [ 1525.461422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.461462] kthread+0x328/0x630 [ 1525.461486] ret_from_fork+0x10/0x20 [ 1525.461517] [ 1525.461528] The buggy address belongs to the object at ffff000827f2f500 [ 1525.461528] which belongs to the cache kmalloc-128 of size 128 [ 1525.461568] The buggy address is located 0 bytes inside of [ 1525.461568] allocated 120-byte region [ffff000827f2f500, ffff000827f2f578) [ 1525.461611] [ 1525.461621] The buggy address belongs to the physical page: [ 1525.461641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.461676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.461709] page_type: f5(slab) [ 1525.461735] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.461772] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.461799] page dumped because: kasan: bad access detected [ 1525.461819] [ 1525.461829] Memory state around the buggy address: [ 1525.461850] ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.461881] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.461911] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.461937] ^ [ 1525.461964] ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.461995] ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.462021] ================================================================== [ 1525.462121] ================================================================== [ 1525.462146] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 1525.462183] Read of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356 [ 1525.462217] [ 1525.462233] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.462293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.462313] Hardware name: ARM Juno development board (r2) (DT) [ 1525.462335] Call trace: [ 1525.462348] show_stack+0x20/0x38 (C) [ 1525.462385] dump_stack_lvl+0x8c/0xd0 [ 1525.462425] print_report+0x118/0x608 [ 1525.462466] kasan_report+0xdc/0x128 [ 1525.462506] kasan_check_range+0x100/0x1a8 [ 1525.462549] __kasan_check_read+0x20/0x30 [ 1525.462585] copy_user_test_oob+0x728/0xec8 [ 1525.462625] kunit_try_run_case+0x170/0x3f0 [ 1525.462665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.462711] kthread+0x328/0x630 [ 1525.462742] ret_from_fork+0x10/0x20 [ 1525.462780] [ 1525.462791] Allocated by task 356: [ 1525.462809] kasan_save_stack+0x3c/0x68 [ 1525.462844] kasan_save_track+0x20/0x40 [ 1525.462877] kasan_save_alloc_info+0x40/0x58 [ 1525.462906] __kasan_kmalloc+0xd4/0xd8 [ 1525.462938] __kmalloc_noprof+0x198/0x4c8 [ 1525.462971] kunit_kmalloc_array+0x34/0x88 [ 1525.463003] copy_user_test_oob+0xac/0xec8 [ 1525.463037] kunit_try_run_case+0x170/0x3f0 [ 1525.463069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.463109] kthread+0x328/0x630 [ 1525.463134] ret_from_fork+0x10/0x20 [ 1525.463164] [ 1525.463175] The buggy address belongs to the object at ffff000827f2f500 [ 1525.463175] which belongs to the cache kmalloc-128 of size 128 [ 1525.463214] The buggy address is located 0 bytes inside of [ 1525.463214] allocated 120-byte region [ffff000827f2f500, ffff000827f2f578) [ 1525.463258] [ 1525.463269] The buggy address belongs to the physical page: [ 1525.463287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.463322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.463354] page_type: f5(slab) [ 1525.463381] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.463417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.463444] page dumped because: kasan: bad access detected [ 1525.463464] [ 1525.463474] Memory state around the buggy address: [ 1525.463495] ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.463526] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.463556] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.463581] ^ [ 1525.463609] ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.463640] ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.463666] ================================================================== [ 1525.463883] ================================================================== [ 1525.463910] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 1525.463947] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356 [ 1525.463983] [ 1525.463999] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.464059] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.464079] Hardware name: ARM Juno development board (r2) (DT) [ 1525.464101] Call trace: [ 1525.464114] show_stack+0x20/0x38 (C) [ 1525.464151] dump_stack_lvl+0x8c/0xd0 [ 1525.464191] print_report+0x118/0x608 [ 1525.464232] kasan_report+0xdc/0x128 [ 1525.464272] kasan_check_range+0x100/0x1a8 [ 1525.464315] __kasan_check_write+0x20/0x30 [ 1525.464351] copy_user_test_oob+0x35c/0xec8 [ 1525.464391] kunit_try_run_case+0x170/0x3f0 [ 1525.464431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.464477] kthread+0x328/0x630 [ 1525.464509] ret_from_fork+0x10/0x20 [ 1525.464547] [ 1525.464557] Allocated by task 356: [ 1525.464575] kasan_save_stack+0x3c/0x68 [ 1525.464609] kasan_save_track+0x20/0x40 [ 1525.464643] kasan_save_alloc_info+0x40/0x58 [ 1525.464672] __kasan_kmalloc+0xd4/0xd8 [ 1525.464705] __kmalloc_noprof+0x198/0x4c8 [ 1525.464738] kunit_kmalloc_array+0x34/0x88 [ 1525.464770] copy_user_test_oob+0xac/0xec8 [ 1525.464803] kunit_try_run_case+0x170/0x3f0 [ 1525.464835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.464875] kthread+0x328/0x630 [ 1525.464900] ret_from_fork+0x10/0x20 [ 1525.464930] [ 1525.464940] The buggy address belongs to the object at ffff000827f2f500 [ 1525.464940] which belongs to the cache kmalloc-128 of size 128 [ 1525.464979] The buggy address is located 0 bytes inside of [ 1525.464979] allocated 120-byte region [ffff000827f2f500, ffff000827f2f578) [ 1525.465023] [ 1525.465034] The buggy address belongs to the physical page: [ 1525.465052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.465087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.465120] page_type: f5(slab) [ 1525.465146] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.465182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.465209] page dumped because: kasan: bad access detected [ 1525.465229] [ 1525.465239] Memory state around the buggy address: [ 1525.465260] ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.465290] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.465321] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.465346] ^ [ 1525.465373] ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.465404] ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.465430] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 1525.454463] ================================================================== [ 1525.454492] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 1525.454537] Read of size 8 at addr ffff000827f2f478 by task kunit_try_catch/352 [ 1525.454572] [ 1525.454589] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.454651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.454669] Hardware name: ARM Juno development board (r2) (DT) [ 1525.454693] Call trace: [ 1525.454706] show_stack+0x20/0x38 (C) [ 1525.454744] dump_stack_lvl+0x8c/0xd0 [ 1525.454785] print_report+0x118/0x608 [ 1525.454827] kasan_report+0xdc/0x128 [ 1525.454867] __asan_report_load8_noabort+0x20/0x30 [ 1525.454906] copy_to_kernel_nofault+0x204/0x250 [ 1525.454948] copy_to_kernel_nofault_oob+0x158/0x418 [ 1525.454989] kunit_try_run_case+0x170/0x3f0 [ 1525.455030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.455076] kthread+0x328/0x630 [ 1525.455109] ret_from_fork+0x10/0x20 [ 1525.455146] [ 1525.455158] Allocated by task 352: [ 1525.455176] kasan_save_stack+0x3c/0x68 [ 1525.455212] kasan_save_track+0x20/0x40 [ 1525.455244] kasan_save_alloc_info+0x40/0x58 [ 1525.455273] __kasan_kmalloc+0xd4/0xd8 [ 1525.455306] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.455341] copy_to_kernel_nofault_oob+0xc8/0x418 [ 1525.455374] kunit_try_run_case+0x170/0x3f0 [ 1525.455407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.455446] kthread+0x328/0x630 [ 1525.455471] ret_from_fork+0x10/0x20 [ 1525.455501] [ 1525.455512] The buggy address belongs to the object at ffff000827f2f400 [ 1525.455512] which belongs to the cache kmalloc-128 of size 128 [ 1525.455552] The buggy address is located 0 bytes to the right of [ 1525.455552] allocated 120-byte region [ffff000827f2f400, ffff000827f2f478) [ 1525.455598] [ 1525.455609] The buggy address belongs to the physical page: [ 1525.455628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.455664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.455697] page_type: f5(slab) [ 1525.455725] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.455761] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.455788] page dumped because: kasan: bad access detected [ 1525.455808] [ 1525.455818] Memory state around the buggy address: [ 1525.455839] ffff000827f2f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.455869] ffff000827f2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.455900] >ffff000827f2f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.455927] ^ [ 1525.455954] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.455985] ffff000827f2f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.456011] ================================================================== [ 1525.456085] ================================================================== [ 1525.456110] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 1525.456148] Write of size 8 at addr ffff000827f2f478 by task kunit_try_catch/352 [ 1525.456182] [ 1525.456198] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.456258] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.456278] Hardware name: ARM Juno development board (r2) (DT) [ 1525.456300] Call trace: [ 1525.456313] show_stack+0x20/0x38 (C) [ 1525.456349] dump_stack_lvl+0x8c/0xd0 [ 1525.456389] print_report+0x118/0x608 [ 1525.456431] kasan_report+0xdc/0x128 [ 1525.456471] kasan_check_range+0x100/0x1a8 [ 1525.456516] __kasan_check_write+0x20/0x30 [ 1525.456551] copy_to_kernel_nofault+0x8c/0x250 [ 1525.456593] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 1525.456634] kunit_try_run_case+0x170/0x3f0 [ 1525.456674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.456720] kthread+0x328/0x630 [ 1525.456752] ret_from_fork+0x10/0x20 [ 1525.456791] [ 1525.456801] Allocated by task 352: [ 1525.456819] kasan_save_stack+0x3c/0x68 [ 1525.456853] kasan_save_track+0x20/0x40 [ 1525.456886] kasan_save_alloc_info+0x40/0x58 [ 1525.456915] __kasan_kmalloc+0xd4/0xd8 [ 1525.456948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.456981] copy_to_kernel_nofault_oob+0xc8/0x418 [ 1525.457015] kunit_try_run_case+0x170/0x3f0 [ 1525.457048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.457087] kthread+0x328/0x630 [ 1525.457112] ret_from_fork+0x10/0x20 [ 1525.457143] [ 1525.457153] The buggy address belongs to the object at ffff000827f2f400 [ 1525.457153] which belongs to the cache kmalloc-128 of size 128 [ 1525.457193] The buggy address is located 0 bytes to the right of [ 1525.457193] allocated 120-byte region [ffff000827f2f400, ffff000827f2f478) [ 1525.457239] [ 1525.457249] The buggy address belongs to the physical page: [ 1525.457268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f [ 1525.457302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.457334] page_type: f5(slab) [ 1525.457361] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000 [ 1525.457397] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1525.457425] page dumped because: kasan: bad access detected [ 1525.457444] [ 1525.457454] Memory state around the buggy address: [ 1525.457474] ffff000827f2f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1525.457505] ffff000827f2f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.457536] >ffff000827f2f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 1525.457562] ^ [ 1525.457589] ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.457619] ffff000827f2f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.457645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 1525.445675] ================================================================== [ 1525.445698] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 1525.445729] Read of size 1 at addr ffff800087c5d7f8 by task kunit_try_catch/340 [ 1525.445764] [ 1525.445779] CPU: 4 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.445839] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.445859] Hardware name: ARM Juno development board (r2) (DT) [ 1525.445882] Call trace: [ 1525.445894] show_stack+0x20/0x38 (C) [ 1525.445931] dump_stack_lvl+0x8c/0xd0 [ 1525.445970] print_report+0x310/0x608 [ 1525.446011] kasan_report+0xdc/0x128 [ 1525.446051] __asan_report_load1_noabort+0x20/0x30 [ 1525.446089] vmalloc_oob+0x51c/0x5d0 [ 1525.446125] kunit_try_run_case+0x170/0x3f0 [ 1525.446165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.446212] kthread+0x328/0x630 [ 1525.446244] ret_from_fork+0x10/0x20 [ 1525.446282] [ 1525.446296] The buggy address belongs to the virtual mapping at [ 1525.446296] [ffff800087c5d000, ffff800087c5f000) created by: [ 1525.446296] vmalloc_oob+0x98/0x5d0 [ 1525.446354] [ 1525.446364] The buggy address belongs to the physical page: [ 1525.446384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a79b2 [ 1525.446419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.446461] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 1525.446497] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 1525.446526] page dumped because: kasan: bad access detected [ 1525.446544] [ 1525.446554] Memory state around the buggy address: [ 1525.446575] ffff800087c5d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1525.446605] ffff800087c5d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1525.446635] >ffff800087c5d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 1525.446661] ^ [ 1525.446688] ffff800087c5d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 1525.446719] ffff800087c5d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 1525.446745] ================================================================== [ 1525.444553] ================================================================== [ 1525.444581] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 1525.444620] Read of size 1 at addr ffff800087c5d7f3 by task kunit_try_catch/340 [ 1525.444655] [ 1525.444673] CPU: 4 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.444736] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.444756] Hardware name: ARM Juno development board (r2) (DT) [ 1525.444780] Call trace: [ 1525.444793] show_stack+0x20/0x38 (C) [ 1525.444830] dump_stack_lvl+0x8c/0xd0 [ 1525.444871] print_report+0x310/0x608 [ 1525.444913] kasan_report+0xdc/0x128 [ 1525.444953] __asan_report_load1_noabort+0x20/0x30 [ 1525.444991] vmalloc_oob+0x578/0x5d0 [ 1525.445026] kunit_try_run_case+0x170/0x3f0 [ 1525.445067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.445113] kthread+0x328/0x630 [ 1525.445145] ret_from_fork+0x10/0x20 [ 1525.445183] [ 1525.445195] The buggy address belongs to the virtual mapping at [ 1525.445195] [ffff800087c5d000, ffff800087c5f000) created by: [ 1525.445195] vmalloc_oob+0x98/0x5d0 [ 1525.445252] [ 1525.445264] The buggy address belongs to the physical page: [ 1525.445283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a79b2 [ 1525.445318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.445362] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 1525.445398] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 1525.445425] page dumped because: kasan: bad access detected [ 1525.445445] [ 1525.445455] Memory state around the buggy address: [ 1525.445476] ffff800087c5d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1525.445506] ffff800087c5d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1525.445537] >ffff800087c5d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 1525.445563] ^ [ 1525.445590] ffff800087c5d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 1525.445620] ffff800087c5d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 1525.445646] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 1525.426849] ================================================================== [ 1525.426859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 1525.426874] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.426888] [ 1525.426894] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.426919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.426927] Hardware name: ARM Juno development board (r2) (DT) [ 1525.426937] Call trace: [ 1525.426942] show_stack+0x20/0x38 (C) [ 1525.426957] dump_stack_lvl+0x8c/0xd0 [ 1525.426973] print_report+0x118/0x608 [ 1525.426991] kasan_report+0xdc/0x128 [ 1525.427008] kasan_check_range+0x100/0x1a8 [ 1525.427027] __kasan_check_write+0x20/0x30 [ 1525.427041] kasan_atomics_helper+0xff0/0x4858 [ 1525.427057] kasan_atomics+0x198/0x2e0 [ 1525.427073] kunit_try_run_case+0x170/0x3f0 [ 1525.427089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.427108] kthread+0x328/0x630 [ 1525.427120] ret_from_fork+0x10/0x20 [ 1525.427136] [ 1525.427140] Allocated by task 336: [ 1525.427147] kasan_save_stack+0x3c/0x68 [ 1525.427162] kasan_save_track+0x20/0x40 [ 1525.427176] kasan_save_alloc_info+0x40/0x58 [ 1525.427188] __kasan_kmalloc+0xd4/0xd8 [ 1525.427202] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.427215] kasan_atomics+0xb8/0x2e0 [ 1525.427228] kunit_try_run_case+0x170/0x3f0 [ 1525.427241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.427257] kthread+0x328/0x630 [ 1525.427267] ret_from_fork+0x10/0x20 [ 1525.427279] [ 1525.427283] The buggy address belongs to the object at ffff000826289e00 [ 1525.427283] which belongs to the cache kmalloc-64 of size 64 [ 1525.427299] The buggy address is located 0 bytes to the right of [ 1525.427299] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.427318] [ 1525.427322] The buggy address belongs to the physical page: [ 1525.427330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.427344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.427357] page_type: f5(slab) [ 1525.427368] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.427382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.427393] page dumped because: kasan: bad access detected [ 1525.427402] [ 1525.427406] Memory state around the buggy address: [ 1525.427414] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.427426] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.427438] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.427449] ^ [ 1525.427458] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.427471] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.427481] ================================================================== [ 1525.437243] ================================================================== [ 1525.437253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 1525.437268] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.437282] [ 1525.437288] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.437314] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.437322] Hardware name: ARM Juno development board (r2) (DT) [ 1525.437332] Call trace: [ 1525.437337] show_stack+0x20/0x38 (C) [ 1525.437352] dump_stack_lvl+0x8c/0xd0 [ 1525.437368] print_report+0x118/0x608 [ 1525.437386] kasan_report+0xdc/0x128 [ 1525.437403] kasan_check_range+0x100/0x1a8 [ 1525.437421] __kasan_check_write+0x20/0x30 [ 1525.437436] kasan_atomics_helper+0x1644/0x4858 [ 1525.437453] kasan_atomics+0x198/0x2e0 [ 1525.437469] kunit_try_run_case+0x170/0x3f0 [ 1525.437485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.437504] kthread+0x328/0x630 [ 1525.437516] ret_from_fork+0x10/0x20 [ 1525.437531] [ 1525.437535] Allocated by task 336: [ 1525.437543] kasan_save_stack+0x3c/0x68 [ 1525.437557] kasan_save_track+0x20/0x40 [ 1525.437572] kasan_save_alloc_info+0x40/0x58 [ 1525.437583] __kasan_kmalloc+0xd4/0xd8 [ 1525.437597] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.437610] kasan_atomics+0xb8/0x2e0 [ 1525.437623] kunit_try_run_case+0x170/0x3f0 [ 1525.437636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.437652] kthread+0x328/0x630 [ 1525.437662] ret_from_fork+0x10/0x20 [ 1525.437674] [ 1525.437678] The buggy address belongs to the object at ffff000826289e00 [ 1525.437678] which belongs to the cache kmalloc-64 of size 64 [ 1525.437695] The buggy address is located 0 bytes to the right of [ 1525.437695] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.437714] [ 1525.437718] The buggy address belongs to the physical page: [ 1525.437726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.437740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.437753] page_type: f5(slab) [ 1525.437764] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.437778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.437789] page dumped because: kasan: bad access detected [ 1525.437798] [ 1525.437802] Memory state around the buggy address: [ 1525.437810] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.437822] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.437835] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.437845] ^ [ 1525.437854] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.437866] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.437877] ================================================================== [ 1525.439167] ================================================================== [ 1525.439176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 1525.439191] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.439206] [ 1525.439212] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.439237] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.439245] Hardware name: ARM Juno development board (r2) (DT) [ 1525.439255] Call trace: [ 1525.439260] show_stack+0x20/0x38 (C) [ 1525.439276] dump_stack_lvl+0x8c/0xd0 [ 1525.439292] print_report+0x118/0x608 [ 1525.439310] kasan_report+0xdc/0x128 [ 1525.439327] __asan_report_load8_noabort+0x20/0x30 [ 1525.439342] kasan_atomics_helper+0x3e10/0x4858 [ 1525.439359] kasan_atomics+0x198/0x2e0 [ 1525.439375] kunit_try_run_case+0x170/0x3f0 [ 1525.439391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.439410] kthread+0x328/0x630 [ 1525.439423] ret_from_fork+0x10/0x20 [ 1525.439438] [ 1525.439442] Allocated by task 336: [ 1525.439449] kasan_save_stack+0x3c/0x68 [ 1525.439464] kasan_save_track+0x20/0x40 [ 1525.439478] kasan_save_alloc_info+0x40/0x58 [ 1525.439489] __kasan_kmalloc+0xd4/0xd8 [ 1525.439503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.439517] kasan_atomics+0xb8/0x2e0 [ 1525.439530] kunit_try_run_case+0x170/0x3f0 [ 1525.439543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.439558] kthread+0x328/0x630 [ 1525.439568] ret_from_fork+0x10/0x20 [ 1525.439581] [ 1525.439585] The buggy address belongs to the object at ffff000826289e00 [ 1525.439585] which belongs to the cache kmalloc-64 of size 64 [ 1525.439601] The buggy address is located 0 bytes to the right of [ 1525.439601] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.439620] [ 1525.439625] The buggy address belongs to the physical page: [ 1525.439632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.439647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.439660] page_type: f5(slab) [ 1525.439670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.439685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.439696] page dumped because: kasan: bad access detected [ 1525.439704] [ 1525.439708] Memory state around the buggy address: [ 1525.439717] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.439729] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.439741] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.439752] ^ [ 1525.439761] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.439773] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.439784] ================================================================== [ 1525.422952] ================================================================== [ 1525.422961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 1525.422976] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.422990] [ 1525.422996] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.423022] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.423030] Hardware name: ARM Juno development board (r2) (DT) [ 1525.423039] Call trace: [ 1525.423044] show_stack+0x20/0x38 (C) [ 1525.423059] dump_stack_lvl+0x8c/0xd0 [ 1525.423076] print_report+0x118/0x608 [ 1525.423093] kasan_report+0xdc/0x128 [ 1525.423110] __asan_report_load8_noabort+0x20/0x30 [ 1525.423126] kasan_atomics_helper+0x3f58/0x4858 [ 1525.423143] kasan_atomics+0x198/0x2e0 [ 1525.423158] kunit_try_run_case+0x170/0x3f0 [ 1525.423175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.423194] kthread+0x328/0x630 [ 1525.423206] ret_from_fork+0x10/0x20 [ 1525.423222] [ 1525.423226] Allocated by task 336: [ 1525.423233] kasan_save_stack+0x3c/0x68 [ 1525.423249] kasan_save_track+0x20/0x40 [ 1525.423263] kasan_save_alloc_info+0x40/0x58 [ 1525.423274] __kasan_kmalloc+0xd4/0xd8 [ 1525.423289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.423302] kasan_atomics+0xb8/0x2e0 [ 1525.423315] kunit_try_run_case+0x170/0x3f0 [ 1525.423329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.423345] kthread+0x328/0x630 [ 1525.423355] ret_from_fork+0x10/0x20 [ 1525.423367] [ 1525.423371] The buggy address belongs to the object at ffff000826289e00 [ 1525.423371] which belongs to the cache kmalloc-64 of size 64 [ 1525.423389] The buggy address is located 0 bytes to the right of [ 1525.423389] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.423407] [ 1525.423412] The buggy address belongs to the physical page: [ 1525.423420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.423434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.423448] page_type: f5(slab) [ 1525.423458] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.423473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.423484] page dumped because: kasan: bad access detected [ 1525.423493] [ 1525.423497] Memory state around the buggy address: [ 1525.423506] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.423519] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.423531] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.423542] ^ [ 1525.423551] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.423564] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.423575] ================================================================== [ 1525.422304] ================================================================== [ 1525.422314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 1525.422329] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.422343] [ 1525.422350] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.422375] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.422383] Hardware name: ARM Juno development board (r2) (DT) [ 1525.422392] Call trace: [ 1525.422398] show_stack+0x20/0x38 (C) [ 1525.422413] dump_stack_lvl+0x8c/0xd0 [ 1525.422429] print_report+0x118/0x608 [ 1525.422447] kasan_report+0xdc/0x128 [ 1525.422464] kasan_check_range+0x100/0x1a8 [ 1525.422482] __kasan_check_read+0x20/0x30 [ 1525.422496] kasan_atomics_helper+0xdd4/0x4858 [ 1525.422513] kasan_atomics+0x198/0x2e0 [ 1525.422528] kunit_try_run_case+0x170/0x3f0 [ 1525.422545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.422563] kthread+0x328/0x630 [ 1525.422575] ret_from_fork+0x10/0x20 [ 1525.422591] [ 1525.422595] Allocated by task 336: [ 1525.422602] kasan_save_stack+0x3c/0x68 [ 1525.422617] kasan_save_track+0x20/0x40 [ 1525.422631] kasan_save_alloc_info+0x40/0x58 [ 1525.422643] __kasan_kmalloc+0xd4/0xd8 [ 1525.422657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.422670] kasan_atomics+0xb8/0x2e0 [ 1525.422683] kunit_try_run_case+0x170/0x3f0 [ 1525.422696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.422712] kthread+0x328/0x630 [ 1525.422721] ret_from_fork+0x10/0x20 [ 1525.422734] [ 1525.422738] The buggy address belongs to the object at ffff000826289e00 [ 1525.422738] which belongs to the cache kmalloc-64 of size 64 [ 1525.422754] The buggy address is located 0 bytes to the right of [ 1525.422754] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.422773] [ 1525.422778] The buggy address belongs to the physical page: [ 1525.422785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.422800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.422813] page_type: f5(slab) [ 1525.422823] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.422839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.422850] page dumped because: kasan: bad access detected [ 1525.422859] [ 1525.422863] Memory state around the buggy address: [ 1525.422871] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.422884] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.422896] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.422907] ^ [ 1525.422916] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.422929] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.422940] ================================================================== [ 1525.424264] ================================================================== [ 1525.424275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 1525.424292] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.424306] [ 1525.424312] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.424338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.424346] Hardware name: ARM Juno development board (r2) (DT) [ 1525.424356] Call trace: [ 1525.424361] show_stack+0x20/0x38 (C) [ 1525.424377] dump_stack_lvl+0x8c/0xd0 [ 1525.424393] print_report+0x118/0x608 [ 1525.424411] kasan_report+0xdc/0x128 [ 1525.424427] __asan_report_store8_noabort+0x20/0x30 [ 1525.424443] kasan_atomics_helper+0x3e5c/0x4858 [ 1525.424460] kasan_atomics+0x198/0x2e0 [ 1525.424476] kunit_try_run_case+0x170/0x3f0 [ 1525.424492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.424511] kthread+0x328/0x630 [ 1525.424523] ret_from_fork+0x10/0x20 [ 1525.424539] [ 1525.424543] Allocated by task 336: [ 1525.424550] kasan_save_stack+0x3c/0x68 [ 1525.424565] kasan_save_track+0x20/0x40 [ 1525.424579] kasan_save_alloc_info+0x40/0x58 [ 1525.424590] __kasan_kmalloc+0xd4/0xd8 [ 1525.424604] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.424618] kasan_atomics+0xb8/0x2e0 [ 1525.424631] kunit_try_run_case+0x170/0x3f0 [ 1525.424644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.424660] kthread+0x328/0x630 [ 1525.424670] ret_from_fork+0x10/0x20 [ 1525.424682] [ 1525.424686] The buggy address belongs to the object at ffff000826289e00 [ 1525.424686] which belongs to the cache kmalloc-64 of size 64 [ 1525.424702] The buggy address is located 0 bytes to the right of [ 1525.424702] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.424721] [ 1525.424725] The buggy address belongs to the physical page: [ 1525.424734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.424748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.424761] page_type: f5(slab) [ 1525.424772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.424787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.424798] page dumped because: kasan: bad access detected [ 1525.424806] [ 1525.424810] Memory state around the buggy address: [ 1525.424819] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.424831] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.424844] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.424855] ^ [ 1525.424864] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.424876] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.424887] ================================================================== [ 1525.421674] ================================================================== [ 1525.421684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 1525.421699] Read of size 4 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.421713] [ 1525.421719] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.421744] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.421752] Hardware name: ARM Juno development board (r2) (DT) [ 1525.421762] Call trace: [ 1525.421767] show_stack+0x20/0x38 (C) [ 1525.421782] dump_stack_lvl+0x8c/0xd0 [ 1525.421799] print_report+0x118/0x608 [ 1525.421816] kasan_report+0xdc/0x128 [ 1525.421833] __asan_report_load4_noabort+0x20/0x30 [ 1525.421848] kasan_atomics_helper+0x3e04/0x4858 [ 1525.421865] kasan_atomics+0x198/0x2e0 [ 1525.421881] kunit_try_run_case+0x170/0x3f0 [ 1525.421897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.421916] kthread+0x328/0x630 [ 1525.421928] ret_from_fork+0x10/0x20 [ 1525.421944] [ 1525.421948] Allocated by task 336: [ 1525.421955] kasan_save_stack+0x3c/0x68 [ 1525.421969] kasan_save_track+0x20/0x40 [ 1525.421984] kasan_save_alloc_info+0x40/0x58 [ 1525.421994] __kasan_kmalloc+0xd4/0xd8 [ 1525.422009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.422022] kasan_atomics+0xb8/0x2e0 [ 1525.422035] kunit_try_run_case+0x170/0x3f0 [ 1525.422048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.422064] kthread+0x328/0x630 [ 1525.422074] ret_from_fork+0x10/0x20 [ 1525.422086] [ 1525.422090] The buggy address belongs to the object at ffff000826289e00 [ 1525.422090] which belongs to the cache kmalloc-64 of size 64 [ 1525.422106] The buggy address is located 0 bytes to the right of [ 1525.422106] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.422125] [ 1525.422130] The buggy address belongs to the physical page: [ 1525.422137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.422152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.422165] page_type: f5(slab) [ 1525.422176] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.422191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.422202] page dumped because: kasan: bad access detected [ 1525.422211] [ 1525.422215] Memory state around the buggy address: [ 1525.422223] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.422236] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.422249] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.422259] ^ [ 1525.422269] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.422281] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.422292] ================================================================== [ 1525.428154] ================================================================== [ 1525.428165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 1525.428181] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.428195] [ 1525.428201] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.428227] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.428235] Hardware name: ARM Juno development board (r2) (DT) [ 1525.428245] Call trace: [ 1525.428250] show_stack+0x20/0x38 (C) [ 1525.428266] dump_stack_lvl+0x8c/0xd0 [ 1525.428282] print_report+0x118/0x608 [ 1525.428300] kasan_report+0xdc/0x128 [ 1525.428317] kasan_check_range+0x100/0x1a8 [ 1525.428336] __kasan_check_write+0x20/0x30 [ 1525.428350] kasan_atomics_helper+0x10c0/0x4858 [ 1525.428367] kasan_atomics+0x198/0x2e0 [ 1525.428382] kunit_try_run_case+0x170/0x3f0 [ 1525.428398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.428417] kthread+0x328/0x630 [ 1525.428429] ret_from_fork+0x10/0x20 [ 1525.428445] [ 1525.428449] Allocated by task 336: [ 1525.428456] kasan_save_stack+0x3c/0x68 [ 1525.428471] kasan_save_track+0x20/0x40 [ 1525.428485] kasan_save_alloc_info+0x40/0x58 [ 1525.428496] __kasan_kmalloc+0xd4/0xd8 [ 1525.428510] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.428524] kasan_atomics+0xb8/0x2e0 [ 1525.428536] kunit_try_run_case+0x170/0x3f0 [ 1525.428550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.428565] kthread+0x328/0x630 [ 1525.428575] ret_from_fork+0x10/0x20 [ 1525.428588] [ 1525.428592] The buggy address belongs to the object at ffff000826289e00 [ 1525.428592] which belongs to the cache kmalloc-64 of size 64 [ 1525.428608] The buggy address is located 0 bytes to the right of [ 1525.428608] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.428627] [ 1525.428631] The buggy address belongs to the physical page: [ 1525.428639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.428653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.428667] page_type: f5(slab) [ 1525.428678] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.428692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.428704] page dumped because: kasan: bad access detected [ 1525.428712] [ 1525.428716] Memory state around the buggy address: [ 1525.428724] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.428737] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.428749] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.428760] ^ [ 1525.428769] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.428781] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.428792] ================================================================== [ 1525.426201] ================================================================== [ 1525.426211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 1525.426226] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.426241] [ 1525.426247] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.426273] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.426281] Hardware name: ARM Juno development board (r2) (DT) [ 1525.426291] Call trace: [ 1525.426296] show_stack+0x20/0x38 (C) [ 1525.426311] dump_stack_lvl+0x8c/0xd0 [ 1525.426328] print_report+0x118/0x608 [ 1525.426346] kasan_report+0xdc/0x128 [ 1525.426362] kasan_check_range+0x100/0x1a8 [ 1525.426381] __kasan_check_write+0x20/0x30 [ 1525.426395] kasan_atomics_helper+0xf88/0x4858 [ 1525.426412] kasan_atomics+0x198/0x2e0 [ 1525.426427] kunit_try_run_case+0x170/0x3f0 [ 1525.426444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.426463] kthread+0x328/0x630 [ 1525.426475] ret_from_fork+0x10/0x20 [ 1525.426490] [ 1525.426495] Allocated by task 336: [ 1525.426502] kasan_save_stack+0x3c/0x68 [ 1525.426516] kasan_save_track+0x20/0x40 [ 1525.426531] kasan_save_alloc_info+0x40/0x58 [ 1525.426542] __kasan_kmalloc+0xd4/0xd8 [ 1525.426556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.426569] kasan_atomics+0xb8/0x2e0 [ 1525.426582] kunit_try_run_case+0x170/0x3f0 [ 1525.426596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.426612] kthread+0x328/0x630 [ 1525.426622] ret_from_fork+0x10/0x20 [ 1525.426634] [ 1525.426638] The buggy address belongs to the object at ffff000826289e00 [ 1525.426638] which belongs to the cache kmalloc-64 of size 64 [ 1525.426655] The buggy address is located 0 bytes to the right of [ 1525.426655] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.426673] [ 1525.426678] The buggy address belongs to the physical page: [ 1525.426686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.426700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.426713] page_type: f5(slab) [ 1525.426723] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.426738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.426749] page dumped because: kasan: bad access detected [ 1525.426757] [ 1525.426761] Memory state around the buggy address: [ 1525.426769] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.426782] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.426794] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.426805] ^ [ 1525.426814] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.426827] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.426837] ================================================================== [ 1525.432055] ================================================================== [ 1525.432066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 1525.432082] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.432096] [ 1525.432102] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.432128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.432136] Hardware name: ARM Juno development board (r2) (DT) [ 1525.432146] Call trace: [ 1525.432151] show_stack+0x20/0x38 (C) [ 1525.432166] dump_stack_lvl+0x8c/0xd0 [ 1525.432183] print_report+0x118/0x608 [ 1525.432200] kasan_report+0xdc/0x128 [ 1525.432217] kasan_check_range+0x100/0x1a8 [ 1525.432236] __kasan_check_write+0x20/0x30 [ 1525.432250] kasan_atomics_helper+0x1384/0x4858 [ 1525.432267] kasan_atomics+0x198/0x2e0 [ 1525.432282] kunit_try_run_case+0x170/0x3f0 [ 1525.432298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.432317] kthread+0x328/0x630 [ 1525.432329] ret_from_fork+0x10/0x20 [ 1525.432344] [ 1525.432349] Allocated by task 336: [ 1525.432356] kasan_save_stack+0x3c/0x68 [ 1525.432371] kasan_save_track+0x20/0x40 [ 1525.432385] kasan_save_alloc_info+0x40/0x58 [ 1525.432396] __kasan_kmalloc+0xd4/0xd8 [ 1525.432410] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.432424] kasan_atomics+0xb8/0x2e0 [ 1525.432437] kunit_try_run_case+0x170/0x3f0 [ 1525.432450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.432466] kthread+0x328/0x630 [ 1525.432475] ret_from_fork+0x10/0x20 [ 1525.432488] [ 1525.432492] The buggy address belongs to the object at ffff000826289e00 [ 1525.432492] which belongs to the cache kmalloc-64 of size 64 [ 1525.432508] The buggy address is located 0 bytes to the right of [ 1525.432508] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.432527] [ 1525.432532] The buggy address belongs to the physical page: [ 1525.432539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.432554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.432567] page_type: f5(slab) [ 1525.432578] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.432592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.432603] page dumped because: kasan: bad access detected [ 1525.432611] [ 1525.432616] Memory state around the buggy address: [ 1525.432624] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.432636] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.432648] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.432659] ^ [ 1525.432668] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.432680] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.432691] ================================================================== [ 1525.431395] ================================================================== [ 1525.431405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 1525.431420] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.431434] [ 1525.431440] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.431465] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.431473] Hardware name: ARM Juno development board (r2) (DT) [ 1525.431483] Call trace: [ 1525.431488] show_stack+0x20/0x38 (C) [ 1525.431503] dump_stack_lvl+0x8c/0xd0 [ 1525.431520] print_report+0x118/0x608 [ 1525.431537] kasan_report+0xdc/0x128 [ 1525.431554] kasan_check_range+0x100/0x1a8 [ 1525.431573] __kasan_check_write+0x20/0x30 [ 1525.431587] kasan_atomics_helper+0x12d8/0x4858 [ 1525.431604] kasan_atomics+0x198/0x2e0 [ 1525.431620] kunit_try_run_case+0x170/0x3f0 [ 1525.431636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.431654] kthread+0x328/0x630 [ 1525.431667] ret_from_fork+0x10/0x20 [ 1525.431682] [ 1525.431686] Allocated by task 336: [ 1525.431693] kasan_save_stack+0x3c/0x68 [ 1525.431708] kasan_save_track+0x20/0x40 [ 1525.431722] kasan_save_alloc_info+0x40/0x58 [ 1525.431733] __kasan_kmalloc+0xd4/0xd8 [ 1525.431748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.431761] kasan_atomics+0xb8/0x2e0 [ 1525.431774] kunit_try_run_case+0x170/0x3f0 [ 1525.431787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.431803] kthread+0x328/0x630 [ 1525.431813] ret_from_fork+0x10/0x20 [ 1525.431825] [ 1525.431829] The buggy address belongs to the object at ffff000826289e00 [ 1525.431829] which belongs to the cache kmalloc-64 of size 64 [ 1525.431846] The buggy address is located 0 bytes to the right of [ 1525.431846] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.431865] [ 1525.431869] The buggy address belongs to the physical page: [ 1525.431877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.431892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.431904] page_type: f5(slab) [ 1525.431915] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.431929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.431941] page dumped because: kasan: bad access detected [ 1525.431949] [ 1525.431953] Memory state around the buggy address: [ 1525.431961] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.431974] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.431986] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.431996] ^ [ 1525.432005] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.432018] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.432029] ================================================================== [ 1525.432703] ================================================================== [ 1525.432713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 1525.432728] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.432742] [ 1525.432748] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.432774] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.432782] Hardware name: ARM Juno development board (r2) (DT) [ 1525.432792] Call trace: [ 1525.432797] show_stack+0x20/0x38 (C) [ 1525.432812] dump_stack_lvl+0x8c/0xd0 [ 1525.432829] print_report+0x118/0x608 [ 1525.432847] kasan_report+0xdc/0x128 [ 1525.432864] __asan_report_load8_noabort+0x20/0x30 [ 1525.432880] kasan_atomics_helper+0x3f04/0x4858 [ 1525.432897] kasan_atomics+0x198/0x2e0 [ 1525.432913] kunit_try_run_case+0x170/0x3f0 [ 1525.432929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.432948] kthread+0x328/0x630 [ 1525.432960] ret_from_fork+0x10/0x20 [ 1525.432976] [ 1525.432980] Allocated by task 336: [ 1525.432987] kasan_save_stack+0x3c/0x68 [ 1525.433002] kasan_save_track+0x20/0x40 [ 1525.433016] kasan_save_alloc_info+0x40/0x58 [ 1525.433027] __kasan_kmalloc+0xd4/0xd8 [ 1525.433041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.433054] kasan_atomics+0xb8/0x2e0 [ 1525.433067] kunit_try_run_case+0x170/0x3f0 [ 1525.433081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.433096] kthread+0x328/0x630 [ 1525.433106] ret_from_fork+0x10/0x20 [ 1525.433118] [ 1525.433123] The buggy address belongs to the object at ffff000826289e00 [ 1525.433123] which belongs to the cache kmalloc-64 of size 64 [ 1525.433139] The buggy address is located 0 bytes to the right of [ 1525.433139] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.433158] [ 1525.433162] The buggy address belongs to the physical page: [ 1525.433170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.433185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.433198] page_type: f5(slab) [ 1525.433208] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.433222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.433234] page dumped because: kasan: bad access detected [ 1525.433242] [ 1525.433246] Memory state around the buggy address: [ 1525.433255] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.433267] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.433279] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.433290] ^ [ 1525.433299] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.433311] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.433322] ================================================================== [ 1525.425550] ================================================================== [ 1525.425560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 1525.425576] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.425590] [ 1525.425596] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.425622] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.425630] Hardware name: ARM Juno development board (r2) (DT) [ 1525.425639] Call trace: [ 1525.425645] show_stack+0x20/0x38 (C) [ 1525.425660] dump_stack_lvl+0x8c/0xd0 [ 1525.425677] print_report+0x118/0x608 [ 1525.425695] kasan_report+0xdc/0x128 [ 1525.425712] kasan_check_range+0x100/0x1a8 [ 1525.425730] __kasan_check_write+0x20/0x30 [ 1525.425745] kasan_atomics_helper+0xf20/0x4858 [ 1525.425761] kasan_atomics+0x198/0x2e0 [ 1525.425777] kunit_try_run_case+0x170/0x3f0 [ 1525.425793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.425812] kthread+0x328/0x630 [ 1525.425824] ret_from_fork+0x10/0x20 [ 1525.425840] [ 1525.425844] Allocated by task 336: [ 1525.425852] kasan_save_stack+0x3c/0x68 [ 1525.425866] kasan_save_track+0x20/0x40 [ 1525.425880] kasan_save_alloc_info+0x40/0x58 [ 1525.425892] __kasan_kmalloc+0xd4/0xd8 [ 1525.425905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.425919] kasan_atomics+0xb8/0x2e0 [ 1525.425932] kunit_try_run_case+0x170/0x3f0 [ 1525.425945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.425962] kthread+0x328/0x630 [ 1525.425971] ret_from_fork+0x10/0x20 [ 1525.425984] [ 1525.425988] The buggy address belongs to the object at ffff000826289e00 [ 1525.425988] which belongs to the cache kmalloc-64 of size 64 [ 1525.426005] The buggy address is located 0 bytes to the right of [ 1525.426005] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.426023] [ 1525.426028] The buggy address belongs to the physical page: [ 1525.426036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.426050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.426063] page_type: f5(slab) [ 1525.426074] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.426088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.426100] page dumped because: kasan: bad access detected [ 1525.426108] [ 1525.426112] Memory state around the buggy address: [ 1525.426120] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.426133] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.426146] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.426157] ^ [ 1525.426166] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.426178] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.426189] ================================================================== [ 1525.421025] ================================================================== [ 1525.421035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 1525.421050] Write of size 4 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.421064] [ 1525.421070] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.421096] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.421104] Hardware name: ARM Juno development board (r2) (DT) [ 1525.421114] Call trace: [ 1525.421119] show_stack+0x20/0x38 (C) [ 1525.421134] dump_stack_lvl+0x8c/0xd0 [ 1525.421151] print_report+0x118/0x608 [ 1525.421168] kasan_report+0xdc/0x128 [ 1525.421185] kasan_check_range+0x100/0x1a8 [ 1525.421203] __kasan_check_write+0x20/0x30 [ 1525.421218] kasan_atomics_helper+0xd3c/0x4858 [ 1525.421234] kasan_atomics+0x198/0x2e0 [ 1525.421250] kunit_try_run_case+0x170/0x3f0 [ 1525.421266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.421285] kthread+0x328/0x630 [ 1525.421297] ret_from_fork+0x10/0x20 [ 1525.421313] [ 1525.421317] Allocated by task 336: [ 1525.421325] kasan_save_stack+0x3c/0x68 [ 1525.421339] kasan_save_track+0x20/0x40 [ 1525.421353] kasan_save_alloc_info+0x40/0x58 [ 1525.421365] __kasan_kmalloc+0xd4/0xd8 [ 1525.421378] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.421392] kasan_atomics+0xb8/0x2e0 [ 1525.421405] kunit_try_run_case+0x170/0x3f0 [ 1525.421418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.421434] kthread+0x328/0x630 [ 1525.421444] ret_from_fork+0x10/0x20 [ 1525.421456] [ 1525.421460] The buggy address belongs to the object at ffff000826289e00 [ 1525.421460] which belongs to the cache kmalloc-64 of size 64 [ 1525.421477] The buggy address is located 0 bytes to the right of [ 1525.421477] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.421496] [ 1525.421500] The buggy address belongs to the physical page: [ 1525.421508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.421523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.421536] page_type: f5(slab) [ 1525.421547] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.421562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.421573] page dumped because: kasan: bad access detected [ 1525.421582] [ 1525.421586] Memory state around the buggy address: [ 1525.421594] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.421607] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.421619] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.421630] ^ [ 1525.421639] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.421651] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.421662] ================================================================== [ 1525.424900] ================================================================== [ 1525.424909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 1525.424925] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.424939] [ 1525.424945] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.424971] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.424980] Hardware name: ARM Juno development board (r2) (DT) [ 1525.424990] Call trace: [ 1525.424995] show_stack+0x20/0x38 (C) [ 1525.425010] dump_stack_lvl+0x8c/0xd0 [ 1525.425027] print_report+0x118/0x608 [ 1525.425044] kasan_report+0xdc/0x128 [ 1525.425061] kasan_check_range+0x100/0x1a8 [ 1525.425079] __kasan_check_write+0x20/0x30 [ 1525.425093] kasan_atomics_helper+0xeb8/0x4858 [ 1525.425110] kasan_atomics+0x198/0x2e0 [ 1525.425126] kunit_try_run_case+0x170/0x3f0 [ 1525.425142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.425161] kthread+0x328/0x630 [ 1525.425173] ret_from_fork+0x10/0x20 [ 1525.425189] [ 1525.425194] Allocated by task 336: [ 1525.425200] kasan_save_stack+0x3c/0x68 [ 1525.425215] kasan_save_track+0x20/0x40 [ 1525.425229] kasan_save_alloc_info+0x40/0x58 [ 1525.425241] __kasan_kmalloc+0xd4/0xd8 [ 1525.425255] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.425269] kasan_atomics+0xb8/0x2e0 [ 1525.425282] kunit_try_run_case+0x170/0x3f0 [ 1525.425295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.425311] kthread+0x328/0x630 [ 1525.425321] ret_from_fork+0x10/0x20 [ 1525.425333] [ 1525.425338] The buggy address belongs to the object at ffff000826289e00 [ 1525.425338] which belongs to the cache kmalloc-64 of size 64 [ 1525.425354] The buggy address is located 0 bytes to the right of [ 1525.425354] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.425373] [ 1525.425378] The buggy address belongs to the physical page: [ 1525.425385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.425400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.425413] page_type: f5(slab) [ 1525.425423] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.425438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.425449] page dumped because: kasan: bad access detected [ 1525.425458] [ 1525.425462] Memory state around the buggy address: [ 1525.425470] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.425483] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.425495] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.425506] ^ [ 1525.425515] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.425528] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.425538] ================================================================== [ 1525.430101] ================================================================== [ 1525.430110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 1525.430125] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.430140] [ 1525.430145] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.430171] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.430179] Hardware name: ARM Juno development board (r2) (DT) [ 1525.430189] Call trace: [ 1525.430194] show_stack+0x20/0x38 (C) [ 1525.430210] dump_stack_lvl+0x8c/0xd0 [ 1525.430226] print_report+0x118/0x608 [ 1525.430243] kasan_report+0xdc/0x128 [ 1525.430260] kasan_check_range+0x100/0x1a8 [ 1525.430279] __kasan_check_write+0x20/0x30 [ 1525.430293] kasan_atomics_helper+0x11f8/0x4858 [ 1525.430310] kasan_atomics+0x198/0x2e0 [ 1525.430326] kunit_try_run_case+0x170/0x3f0 [ 1525.430341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.430360] kthread+0x328/0x630 [ 1525.430373] ret_from_fork+0x10/0x20 [ 1525.430388] [ 1525.430392] Allocated by task 336: [ 1525.430399] kasan_save_stack+0x3c/0x68 [ 1525.430414] kasan_save_track+0x20/0x40 [ 1525.430428] kasan_save_alloc_info+0x40/0x58 [ 1525.430439] __kasan_kmalloc+0xd4/0xd8 [ 1525.430453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.430467] kasan_atomics+0xb8/0x2e0 [ 1525.430480] kunit_try_run_case+0x170/0x3f0 [ 1525.430493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.430509] kthread+0x328/0x630 [ 1525.430519] ret_from_fork+0x10/0x20 [ 1525.430531] [ 1525.430535] The buggy address belongs to the object at ffff000826289e00 [ 1525.430535] which belongs to the cache kmalloc-64 of size 64 [ 1525.430552] The buggy address is located 0 bytes to the right of [ 1525.430552] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.430571] [ 1525.430575] The buggy address belongs to the physical page: [ 1525.430583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.430597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.430610] page_type: f5(slab) [ 1525.430621] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.430635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.430647] page dumped because: kasan: bad access detected [ 1525.430655] [ 1525.430659] Memory state around the buggy address: [ 1525.430667] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.430680] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.430692] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.430702] ^ [ 1525.430712] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.430725] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.430736] ================================================================== [ 1525.437889] ================================================================== [ 1525.437899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 1525.437914] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.437928] [ 1525.437934] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.437959] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.437968] Hardware name: ARM Juno development board (r2) (DT) [ 1525.437978] Call trace: [ 1525.437983] show_stack+0x20/0x38 (C) [ 1525.437998] dump_stack_lvl+0x8c/0xd0 [ 1525.438015] print_report+0x118/0x608 [ 1525.438032] kasan_report+0xdc/0x128 [ 1525.438050] __asan_report_load8_noabort+0x20/0x30 [ 1525.438065] kasan_atomics_helper+0x3df4/0x4858 [ 1525.438082] kasan_atomics+0x198/0x2e0 [ 1525.438098] kunit_try_run_case+0x170/0x3f0 [ 1525.438115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.438134] kthread+0x328/0x630 [ 1525.438146] ret_from_fork+0x10/0x20 [ 1525.438161] [ 1525.438165] Allocated by task 336: [ 1525.438173] kasan_save_stack+0x3c/0x68 [ 1525.438187] kasan_save_track+0x20/0x40 [ 1525.438201] kasan_save_alloc_info+0x40/0x58 [ 1525.438213] __kasan_kmalloc+0xd4/0xd8 [ 1525.438226] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.438240] kasan_atomics+0xb8/0x2e0 [ 1525.438253] kunit_try_run_case+0x170/0x3f0 [ 1525.438266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.438282] kthread+0x328/0x630 [ 1525.438291] ret_from_fork+0x10/0x20 [ 1525.438304] [ 1525.438308] The buggy address belongs to the object at ffff000826289e00 [ 1525.438308] which belongs to the cache kmalloc-64 of size 64 [ 1525.438324] The buggy address is located 0 bytes to the right of [ 1525.438324] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.438343] [ 1525.438347] The buggy address belongs to the physical page: [ 1525.438355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.438370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.438383] page_type: f5(slab) [ 1525.438393] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.438408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.438419] page dumped because: kasan: bad access detected [ 1525.438428] [ 1525.438432] Memory state around the buggy address: [ 1525.438439] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.438452] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.438464] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.438475] ^ [ 1525.438483] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.438496] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.438507] ================================================================== [ 1525.433981] ================================================================== [ 1525.433990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 1525.434006] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.434020] [ 1525.434026] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.434051] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.434059] Hardware name: ARM Juno development board (r2) (DT) [ 1525.434069] Call trace: [ 1525.434074] show_stack+0x20/0x38 (C) [ 1525.434089] dump_stack_lvl+0x8c/0xd0 [ 1525.434106] print_report+0x118/0x608 [ 1525.434123] kasan_report+0xdc/0x128 [ 1525.434140] kasan_check_range+0x100/0x1a8 [ 1525.434159] __kasan_check_write+0x20/0x30 [ 1525.434173] kasan_atomics_helper+0x147c/0x4858 [ 1525.434190] kasan_atomics+0x198/0x2e0 [ 1525.434206] kunit_try_run_case+0x170/0x3f0 [ 1525.434221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.434240] kthread+0x328/0x630 [ 1525.434252] ret_from_fork+0x10/0x20 [ 1525.434268] [ 1525.434272] Allocated by task 336: [ 1525.434280] kasan_save_stack+0x3c/0x68 [ 1525.434294] kasan_save_track+0x20/0x40 [ 1525.434308] kasan_save_alloc_info+0x40/0x58 [ 1525.434320] __kasan_kmalloc+0xd4/0xd8 [ 1525.434333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.434347] kasan_atomics+0xb8/0x2e0 [ 1525.434360] kunit_try_run_case+0x170/0x3f0 [ 1525.434373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.434389] kthread+0x328/0x630 [ 1525.434398] ret_from_fork+0x10/0x20 [ 1525.434411] [ 1525.434415] The buggy address belongs to the object at ffff000826289e00 [ 1525.434415] which belongs to the cache kmalloc-64 of size 64 [ 1525.434431] The buggy address is located 0 bytes to the right of [ 1525.434431] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.434450] [ 1525.434455] The buggy address belongs to the physical page: [ 1525.434463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.434477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.434490] page_type: f5(slab) [ 1525.434500] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.434515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.434526] page dumped because: kasan: bad access detected [ 1525.434534] [ 1525.434539] Memory state around the buggy address: [ 1525.434547] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.434559] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.434571] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.434582] ^ [ 1525.434591] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.434603] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.434614] ================================================================== [ 1525.427493] ================================================================== [ 1525.427502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 1525.427518] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.427532] [ 1525.427538] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.427563] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.427571] Hardware name: ARM Juno development board (r2) (DT) [ 1525.427581] Call trace: [ 1525.427586] show_stack+0x20/0x38 (C) [ 1525.427601] dump_stack_lvl+0x8c/0xd0 [ 1525.427618] print_report+0x118/0x608 [ 1525.427635] kasan_report+0xdc/0x128 [ 1525.427652] kasan_check_range+0x100/0x1a8 [ 1525.427671] __kasan_check_write+0x20/0x30 [ 1525.427685] kasan_atomics_helper+0x1058/0x4858 [ 1525.427702] kasan_atomics+0x198/0x2e0 [ 1525.427717] kunit_try_run_case+0x170/0x3f0 [ 1525.427734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.427752] kthread+0x328/0x630 [ 1525.427765] ret_from_fork+0x10/0x20 [ 1525.427781] [ 1525.427785] Allocated by task 336: [ 1525.427792] kasan_save_stack+0x3c/0x68 [ 1525.427807] kasan_save_track+0x20/0x40 [ 1525.427821] kasan_save_alloc_info+0x40/0x58 [ 1525.427832] __kasan_kmalloc+0xd4/0xd8 [ 1525.427846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.427860] kasan_atomics+0xb8/0x2e0 [ 1525.427873] kunit_try_run_case+0x170/0x3f0 [ 1525.427886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.427902] kthread+0x328/0x630 [ 1525.427911] ret_from_fork+0x10/0x20 [ 1525.427924] [ 1525.427928] The buggy address belongs to the object at ffff000826289e00 [ 1525.427928] which belongs to the cache kmalloc-64 of size 64 [ 1525.427945] The buggy address is located 0 bytes to the right of [ 1525.427945] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.427963] [ 1525.427968] The buggy address belongs to the physical page: [ 1525.427976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.427990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.428003] page_type: f5(slab) [ 1525.428014] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.428028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.428039] page dumped because: kasan: bad access detected [ 1525.428048] [ 1525.428052] Memory state around the buggy address: [ 1525.428060] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.428072] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.428085] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.428095] ^ [ 1525.428104] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.428116] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.428127] ================================================================== [ 1525.423587] ================================================================== [ 1525.423597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 1525.423612] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.423626] [ 1525.423632] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.423658] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.423666] Hardware name: ARM Juno development board (r2) (DT) [ 1525.423675] Call trace: [ 1525.423680] show_stack+0x20/0x38 (C) [ 1525.423695] dump_stack_lvl+0x8c/0xd0 [ 1525.423712] print_report+0x118/0x608 [ 1525.423729] kasan_report+0xdc/0x128 [ 1525.423746] kasan_check_range+0x100/0x1a8 [ 1525.423765] __kasan_check_write+0x20/0x30 [ 1525.423779] kasan_atomics_helper+0xe44/0x4858 [ 1525.423795] kasan_atomics+0x198/0x2e0 [ 1525.423811] kunit_try_run_case+0x170/0x3f0 [ 1525.423827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.423846] kthread+0x328/0x630 [ 1525.423859] ret_from_fork+0x10/0x20 [ 1525.423874] [ 1525.423878] Allocated by task 336: [ 1525.423885] kasan_save_stack+0x3c/0x68 [ 1525.423900] kasan_save_track+0x20/0x40 [ 1525.423914] kasan_save_alloc_info+0x40/0x58 [ 1525.423925] __kasan_kmalloc+0xd4/0xd8 [ 1525.423939] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.423953] kasan_atomics+0xb8/0x2e0 [ 1525.423965] kunit_try_run_case+0x170/0x3f0 [ 1525.423979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.423995] kthread+0x328/0x630 [ 1525.424004] ret_from_fork+0x10/0x20 [ 1525.424017] [ 1525.424021] The buggy address belongs to the object at ffff000826289e00 [ 1525.424021] which belongs to the cache kmalloc-64 of size 64 [ 1525.424037] The buggy address is located 0 bytes to the right of [ 1525.424037] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.424056] [ 1525.424060] The buggy address belongs to the physical page: [ 1525.424068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.424083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.424096] page_type: f5(slab) [ 1525.424107] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.424121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.424133] page dumped because: kasan: bad access detected [ 1525.424141] [ 1525.424145] Memory state around the buggy address: [ 1525.424154] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.424166] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.424179] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.424189] ^ [ 1525.424198] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.424211] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.424222] ================================================================== [ 1525.428804] ================================================================== [ 1525.428814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 1525.428829] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.428843] [ 1525.428849] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.428875] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.428883] Hardware name: ARM Juno development board (r2) (DT) [ 1525.428893] Call trace: [ 1525.428898] show_stack+0x20/0x38 (C) [ 1525.428914] dump_stack_lvl+0x8c/0xd0 [ 1525.428930] print_report+0x118/0x608 [ 1525.428947] kasan_report+0xdc/0x128 [ 1525.428965] kasan_check_range+0x100/0x1a8 [ 1525.428983] __kasan_check_write+0x20/0x30 [ 1525.428997] kasan_atomics_helper+0x1128/0x4858 [ 1525.429014] kasan_atomics+0x198/0x2e0 [ 1525.429030] kunit_try_run_case+0x170/0x3f0 [ 1525.429047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.429065] kthread+0x328/0x630 [ 1525.429078] ret_from_fork+0x10/0x20 [ 1525.429093] [ 1525.429097] Allocated by task 336: [ 1525.429104] kasan_save_stack+0x3c/0x68 [ 1525.429119] kasan_save_track+0x20/0x40 [ 1525.429133] kasan_save_alloc_info+0x40/0x58 [ 1525.429144] __kasan_kmalloc+0xd4/0xd8 [ 1525.429158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.429172] kasan_atomics+0xb8/0x2e0 [ 1525.429184] kunit_try_run_case+0x170/0x3f0 [ 1525.429198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.429214] kthread+0x328/0x630 [ 1525.429223] ret_from_fork+0x10/0x20 [ 1525.429235] [ 1525.429240] The buggy address belongs to the object at ffff000826289e00 [ 1525.429240] which belongs to the cache kmalloc-64 of size 64 [ 1525.429256] The buggy address is located 0 bytes to the right of [ 1525.429256] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.429275] [ 1525.429279] The buggy address belongs to the physical page: [ 1525.429287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.429302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.429315] page_type: f5(slab) [ 1525.429325] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.429340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.429351] page dumped because: kasan: bad access detected [ 1525.429360] [ 1525.429364] Memory state around the buggy address: [ 1525.429372] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.429385] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.429397] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.429408] ^ [ 1525.429416] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.429429] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.429440] ================================================================== [ 1525.438519] ================================================================== [ 1525.438528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 1525.438543] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.438557] [ 1525.438563] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.438589] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.438597] Hardware name: ARM Juno development board (r2) (DT) [ 1525.438607] Call trace: [ 1525.438612] show_stack+0x20/0x38 (C) [ 1525.438628] dump_stack_lvl+0x8c/0xd0 [ 1525.438644] print_report+0x118/0x608 [ 1525.438662] kasan_report+0xdc/0x128 [ 1525.438679] kasan_check_range+0x100/0x1a8 [ 1525.438699] __kasan_check_write+0x20/0x30 [ 1525.438713] kasan_atomics_helper+0x16d0/0x4858 [ 1525.438730] kasan_atomics+0x198/0x2e0 [ 1525.438746] kunit_try_run_case+0x170/0x3f0 [ 1525.438762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.438781] kthread+0x328/0x630 [ 1525.438794] ret_from_fork+0x10/0x20 [ 1525.438809] [ 1525.438813] Allocated by task 336: [ 1525.438821] kasan_save_stack+0x3c/0x68 [ 1525.438835] kasan_save_track+0x20/0x40 [ 1525.438849] kasan_save_alloc_info+0x40/0x58 [ 1525.438861] __kasan_kmalloc+0xd4/0xd8 [ 1525.438875] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.438889] kasan_atomics+0xb8/0x2e0 [ 1525.438901] kunit_try_run_case+0x170/0x3f0 [ 1525.438915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.438930] kthread+0x328/0x630 [ 1525.438940] ret_from_fork+0x10/0x20 [ 1525.438952] [ 1525.438956] The buggy address belongs to the object at ffff000826289e00 [ 1525.438956] which belongs to the cache kmalloc-64 of size 64 [ 1525.438973] The buggy address is located 0 bytes to the right of [ 1525.438973] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.438992] [ 1525.438996] The buggy address belongs to the physical page: [ 1525.439004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.439018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.439031] page_type: f5(slab) [ 1525.439041] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.439056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.439068] page dumped because: kasan: bad access detected [ 1525.439076] [ 1525.439080] Memory state around the buggy address: [ 1525.439088] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.439100] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.439112] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.439123] ^ [ 1525.439131] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.439144] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.439155] ================================================================== [ 1525.429452] ================================================================== [ 1525.429462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 1525.429477] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.429491] [ 1525.429497] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.429523] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.429531] Hardware name: ARM Juno development board (r2) (DT) [ 1525.429541] Call trace: [ 1525.429546] show_stack+0x20/0x38 (C) [ 1525.429562] dump_stack_lvl+0x8c/0xd0 [ 1525.429578] print_report+0x118/0x608 [ 1525.429595] kasan_report+0xdc/0x128 [ 1525.429612] kasan_check_range+0x100/0x1a8 [ 1525.429631] __kasan_check_write+0x20/0x30 [ 1525.429645] kasan_atomics_helper+0x1190/0x4858 [ 1525.429663] kasan_atomics+0x198/0x2e0 [ 1525.429678] kunit_try_run_case+0x170/0x3f0 [ 1525.429694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.429713] kthread+0x328/0x630 [ 1525.429725] ret_from_fork+0x10/0x20 [ 1525.429741] [ 1525.429745] Allocated by task 336: [ 1525.429752] kasan_save_stack+0x3c/0x68 [ 1525.429767] kasan_save_track+0x20/0x40 [ 1525.429781] kasan_save_alloc_info+0x40/0x58 [ 1525.429792] __kasan_kmalloc+0xd4/0xd8 [ 1525.429806] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.429819] kasan_atomics+0xb8/0x2e0 [ 1525.429832] kunit_try_run_case+0x170/0x3f0 [ 1525.429846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.429862] kthread+0x328/0x630 [ 1525.429871] ret_from_fork+0x10/0x20 [ 1525.429884] [ 1525.429888] The buggy address belongs to the object at ffff000826289e00 [ 1525.429888] which belongs to the cache kmalloc-64 of size 64 [ 1525.429905] The buggy address is located 0 bytes to the right of [ 1525.429905] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.429924] [ 1525.429928] The buggy address belongs to the physical page: [ 1525.429936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.429951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.429964] page_type: f5(slab) [ 1525.429974] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.429989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.430000] page dumped because: kasan: bad access detected [ 1525.430009] [ 1525.430013] Memory state around the buggy address: [ 1525.430021] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.430034] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.430046] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.430056] ^ [ 1525.430065] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.430078] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.430088] ================================================================== [ 1525.430748] ================================================================== [ 1525.430758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 1525.430773] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.430787] [ 1525.430793] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.430819] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.430827] Hardware name: ARM Juno development board (r2) (DT) [ 1525.430837] Call trace: [ 1525.430842] show_stack+0x20/0x38 (C) [ 1525.430858] dump_stack_lvl+0x8c/0xd0 [ 1525.430874] print_report+0x118/0x608 [ 1525.430891] kasan_report+0xdc/0x128 [ 1525.430908] kasan_check_range+0x100/0x1a8 [ 1525.430927] __kasan_check_write+0x20/0x30 [ 1525.430941] kasan_atomics_helper+0x126c/0x4858 [ 1525.430958] kasan_atomics+0x198/0x2e0 [ 1525.430974] kunit_try_run_case+0x170/0x3f0 [ 1525.430990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.431009] kthread+0x328/0x630 [ 1525.431021] ret_from_fork+0x10/0x20 [ 1525.431036] [ 1525.431040] Allocated by task 336: [ 1525.431048] kasan_save_stack+0x3c/0x68 [ 1525.431063] kasan_save_track+0x20/0x40 [ 1525.431077] kasan_save_alloc_info+0x40/0x58 [ 1525.431088] __kasan_kmalloc+0xd4/0xd8 [ 1525.431102] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.431115] kasan_atomics+0xb8/0x2e0 [ 1525.431128] kunit_try_run_case+0x170/0x3f0 [ 1525.431141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.431157] kthread+0x328/0x630 [ 1525.431166] ret_from_fork+0x10/0x20 [ 1525.431179] [ 1525.431183] The buggy address belongs to the object at ffff000826289e00 [ 1525.431183] which belongs to the cache kmalloc-64 of size 64 [ 1525.431200] The buggy address is located 0 bytes to the right of [ 1525.431200] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.431219] [ 1525.431223] The buggy address belongs to the physical page: [ 1525.431231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.431245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.431258] page_type: f5(slab) [ 1525.431269] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.431283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.431295] page dumped because: kasan: bad access detected [ 1525.431303] [ 1525.431307] Memory state around the buggy address: [ 1525.431315] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.431328] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.431340] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.431351] ^ [ 1525.431360] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.431372] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.431383] ================================================================== [ 1525.434626] ================================================================== [ 1525.434635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 1525.434650] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.434664] [ 1525.434670] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.434696] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.434705] Hardware name: ARM Juno development board (r2) (DT) [ 1525.434714] Call trace: [ 1525.434720] show_stack+0x20/0x38 (C) [ 1525.434735] dump_stack_lvl+0x8c/0xd0 [ 1525.434751] print_report+0x118/0x608 [ 1525.434769] kasan_report+0xdc/0x128 [ 1525.434786] kasan_check_range+0x100/0x1a8 [ 1525.434805] __kasan_check_write+0x20/0x30 [ 1525.434819] kasan_atomics_helper+0x14e4/0x4858 [ 1525.434837] kasan_atomics+0x198/0x2e0 [ 1525.434852] kunit_try_run_case+0x170/0x3f0 [ 1525.434868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.434887] kthread+0x328/0x630 [ 1525.434900] ret_from_fork+0x10/0x20 [ 1525.434915] [ 1525.434919] Allocated by task 336: [ 1525.434927] kasan_save_stack+0x3c/0x68 [ 1525.434941] kasan_save_track+0x20/0x40 [ 1525.434955] kasan_save_alloc_info+0x40/0x58 [ 1525.434967] __kasan_kmalloc+0xd4/0xd8 [ 1525.434980] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.434994] kasan_atomics+0xb8/0x2e0 [ 1525.435007] kunit_try_run_case+0x170/0x3f0 [ 1525.435020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.435036] kthread+0x328/0x630 [ 1525.435045] ret_from_fork+0x10/0x20 [ 1525.435058] [ 1525.435062] The buggy address belongs to the object at ffff000826289e00 [ 1525.435062] which belongs to the cache kmalloc-64 of size 64 [ 1525.435078] The buggy address is located 0 bytes to the right of [ 1525.435078] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.435097] [ 1525.435102] The buggy address belongs to the physical page: [ 1525.435109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.435124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.435137] page_type: f5(slab) [ 1525.435147] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.435161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.435173] page dumped because: kasan: bad access detected [ 1525.435181] [ 1525.435185] Memory state around the buggy address: [ 1525.435193] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.435206] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.435218] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.435229] ^ [ 1525.435238] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.435250] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.435262] ================================================================== [ 1525.435274] ================================================================== [ 1525.435284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 1525.435299] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.435313] [ 1525.435319] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.435345] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.435353] Hardware name: ARM Juno development board (r2) (DT) [ 1525.435362] Call trace: [ 1525.435368] show_stack+0x20/0x38 (C) [ 1525.435383] dump_stack_lvl+0x8c/0xd0 [ 1525.435400] print_report+0x118/0x608 [ 1525.435417] kasan_report+0xdc/0x128 [ 1525.435435] kasan_check_range+0x100/0x1a8 [ 1525.435453] __kasan_check_write+0x20/0x30 [ 1525.435467] kasan_atomics_helper+0x154c/0x4858 [ 1525.435485] kasan_atomics+0x198/0x2e0 [ 1525.435501] kunit_try_run_case+0x170/0x3f0 [ 1525.435517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.435535] kthread+0x328/0x630 [ 1525.435548] ret_from_fork+0x10/0x20 [ 1525.435564] [ 1525.435568] Allocated by task 336: [ 1525.435576] kasan_save_stack+0x3c/0x68 [ 1525.435591] kasan_save_track+0x20/0x40 [ 1525.435605] kasan_save_alloc_info+0x40/0x58 [ 1525.435617] __kasan_kmalloc+0xd4/0xd8 [ 1525.435630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.435644] kasan_atomics+0xb8/0x2e0 [ 1525.435658] kunit_try_run_case+0x170/0x3f0 [ 1525.435671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.435687] kthread+0x328/0x630 [ 1525.435697] ret_from_fork+0x10/0x20 [ 1525.435710] [ 1525.435714] The buggy address belongs to the object at ffff000826289e00 [ 1525.435714] which belongs to the cache kmalloc-64 of size 64 [ 1525.435731] The buggy address is located 0 bytes to the right of [ 1525.435731] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.435750] [ 1525.435755] The buggy address belongs to the physical page: [ 1525.435763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.435777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.435791] page_type: f5(slab) [ 1525.435801] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.435816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.435827] page dumped because: kasan: bad access detected [ 1525.435835] [ 1525.435840] Memory state around the buggy address: [ 1525.435847] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.435860] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.435872] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.435883] ^ [ 1525.435892] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.435904] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.435915] ================================================================== [ 1525.435928] ================================================================== [ 1525.435938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 1525.435953] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.435967] [ 1525.435973] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.435998] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.436007] Hardware name: ARM Juno development board (r2) (DT) [ 1525.436016] Call trace: [ 1525.436022] show_stack+0x20/0x38 (C) [ 1525.436037] dump_stack_lvl+0x8c/0xd0 [ 1525.436053] print_report+0x118/0x608 [ 1525.436071] kasan_report+0xdc/0x128 [ 1525.436088] kasan_check_range+0x100/0x1a8 [ 1525.436107] __kasan_check_write+0x20/0x30 [ 1525.436121] kasan_atomics_helper+0x15b4/0x4858 [ 1525.436139] kasan_atomics+0x198/0x2e0 [ 1525.436154] kunit_try_run_case+0x170/0x3f0 [ 1525.436170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.436189] kthread+0x328/0x630 [ 1525.436201] ret_from_fork+0x10/0x20 [ 1525.436217] [ 1525.436221] Allocated by task 336: [ 1525.436228] kasan_save_stack+0x3c/0x68 [ 1525.436243] kasan_save_track+0x20/0x40 [ 1525.436257] kasan_save_alloc_info+0x40/0x58 [ 1525.436269] __kasan_kmalloc+0xd4/0xd8 [ 1525.436282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.436296] kasan_atomics+0xb8/0x2e0 [ 1525.436309] kunit_try_run_case+0x170/0x3f0 [ 1525.436322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.436338] kthread+0x328/0x630 [ 1525.436348] ret_from_fork+0x10/0x20 [ 1525.436360] [ 1525.436364] The buggy address belongs to the object at ffff000826289e00 [ 1525.436364] which belongs to the cache kmalloc-64 of size 64 [ 1525.436381] The buggy address is located 0 bytes to the right of [ 1525.436381] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.436400] [ 1525.436404] The buggy address belongs to the physical page: [ 1525.436412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.436426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.436440] page_type: f5(slab) [ 1525.436450] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.436465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.436476] page dumped because: kasan: bad access detected [ 1525.436484] [ 1525.436488] Memory state around the buggy address: [ 1525.436496] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.436509] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.436521] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.436532] ^ [ 1525.436541] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.436554] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.436565] ================================================================== [ 1525.439796] ================================================================== [ 1525.439806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 1525.439821] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.439835] [ 1525.439841] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.439867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.439875] Hardware name: ARM Juno development board (r2) (DT) [ 1525.439885] Call trace: [ 1525.439890] show_stack+0x20/0x38 (C) [ 1525.439906] dump_stack_lvl+0x8c/0xd0 [ 1525.439923] print_report+0x118/0x608 [ 1525.439940] kasan_report+0xdc/0x128 [ 1525.439958] kasan_check_range+0x100/0x1a8 [ 1525.439976] __kasan_check_write+0x20/0x30 [ 1525.439990] kasan_atomics_helper+0x175c/0x4858 [ 1525.440007] kasan_atomics+0x198/0x2e0 [ 1525.440023] kunit_try_run_case+0x170/0x3f0 [ 1525.440040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.440059] kthread+0x328/0x630 [ 1525.440071] ret_from_fork+0x10/0x20 [ 1525.440087] [ 1525.440091] Allocated by task 336: [ 1525.440098] kasan_save_stack+0x3c/0x68 [ 1525.440112] kasan_save_track+0x20/0x40 [ 1525.440127] kasan_save_alloc_info+0x40/0x58 [ 1525.440137] __kasan_kmalloc+0xd4/0xd8 [ 1525.440152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.440166] kasan_atomics+0xb8/0x2e0 [ 1525.440178] kunit_try_run_case+0x170/0x3f0 [ 1525.440192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.440208] kthread+0x328/0x630 [ 1525.440217] ret_from_fork+0x10/0x20 [ 1525.440230] [ 1525.440234] The buggy address belongs to the object at ffff000826289e00 [ 1525.440234] which belongs to the cache kmalloc-64 of size 64 [ 1525.440250] The buggy address is located 0 bytes to the right of [ 1525.440250] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.440269] [ 1525.440274] The buggy address belongs to the physical page: [ 1525.440281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.440295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.440309] page_type: f5(slab) [ 1525.440319] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.440334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.440345] page dumped because: kasan: bad access detected [ 1525.440353] [ 1525.440358] Memory state around the buggy address: [ 1525.440366] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.440378] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.440391] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.440402] ^ [ 1525.440410] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.440422] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.440433] ================================================================== [ 1525.440460] ================================================================== [ 1525.440471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 1525.440487] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.440501] [ 1525.440507] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.440533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.440541] Hardware name: ARM Juno development board (r2) (DT) [ 1525.440550] Call trace: [ 1525.440556] show_stack+0x20/0x38 (C) [ 1525.440571] dump_stack_lvl+0x8c/0xd0 [ 1525.440588] print_report+0x118/0x608 [ 1525.440605] kasan_report+0xdc/0x128 [ 1525.440623] __asan_report_load8_noabort+0x20/0x30 [ 1525.440638] kasan_atomics_helper+0x3e20/0x4858 [ 1525.440655] kasan_atomics+0x198/0x2e0 [ 1525.440671] kunit_try_run_case+0x170/0x3f0 [ 1525.440687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.440706] kthread+0x328/0x630 [ 1525.440719] ret_from_fork+0x10/0x20 [ 1525.440735] [ 1525.440739] Allocated by task 336: [ 1525.440746] kasan_save_stack+0x3c/0x68 [ 1525.440761] kasan_save_track+0x20/0x40 [ 1525.440775] kasan_save_alloc_info+0x40/0x58 [ 1525.440786] __kasan_kmalloc+0xd4/0xd8 [ 1525.440799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.440813] kasan_atomics+0xb8/0x2e0 [ 1525.440826] kunit_try_run_case+0x170/0x3f0 [ 1525.440839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.440855] kthread+0x328/0x630 [ 1525.440864] ret_from_fork+0x10/0x20 [ 1525.440877] [ 1525.440881] The buggy address belongs to the object at ffff000826289e00 [ 1525.440881] which belongs to the cache kmalloc-64 of size 64 [ 1525.440898] The buggy address is located 0 bytes to the right of [ 1525.440898] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.440917] [ 1525.440921] The buggy address belongs to the physical page: [ 1525.440929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.440944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.440957] page_type: f5(slab) [ 1525.440967] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.440982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.440993] page dumped because: kasan: bad access detected [ 1525.441002] [ 1525.441006] Memory state around the buggy address: [ 1525.441014] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.441026] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.441038] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.441049] ^ [ 1525.441058] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.441070] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.441080] ================================================================== [ 1525.436607] ================================================================== [ 1525.436619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 1525.436635] Read of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.436649] [ 1525.436655] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.436682] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.436690] Hardware name: ARM Juno development board (r2) (DT) [ 1525.436700] Call trace: [ 1525.436705] show_stack+0x20/0x38 (C) [ 1525.436721] dump_stack_lvl+0x8c/0xd0 [ 1525.436738] print_report+0x118/0x608 [ 1525.436755] kasan_report+0xdc/0x128 [ 1525.436772] __asan_report_load8_noabort+0x20/0x30 [ 1525.436787] kasan_atomics_helper+0x3db0/0x4858 [ 1525.436805] kasan_atomics+0x198/0x2e0 [ 1525.436821] kunit_try_run_case+0x170/0x3f0 [ 1525.436837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.436855] kthread+0x328/0x630 [ 1525.436867] ret_from_fork+0x10/0x20 [ 1525.436883] [ 1525.436887] Allocated by task 336: [ 1525.436894] kasan_save_stack+0x3c/0x68 [ 1525.436909] kasan_save_track+0x20/0x40 [ 1525.436923] kasan_save_alloc_info+0x40/0x58 [ 1525.436934] __kasan_kmalloc+0xd4/0xd8 [ 1525.436949] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.436962] kasan_atomics+0xb8/0x2e0 [ 1525.436975] kunit_try_run_case+0x170/0x3f0 [ 1525.436988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.437004] kthread+0x328/0x630 [ 1525.437013] ret_from_fork+0x10/0x20 [ 1525.437026] [ 1525.437030] The buggy address belongs to the object at ffff000826289e00 [ 1525.437030] which belongs to the cache kmalloc-64 of size 64 [ 1525.437047] The buggy address is located 0 bytes to the right of [ 1525.437047] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.437066] [ 1525.437070] The buggy address belongs to the physical page: [ 1525.437078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.437093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.437106] page_type: f5(slab) [ 1525.437117] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.437131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.437142] page dumped because: kasan: bad access detected [ 1525.437151] [ 1525.437155] Memory state around the buggy address: [ 1525.437163] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.437176] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.437188] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.437198] ^ [ 1525.437207] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.437220] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.437231] ================================================================== [ 1525.441093] ================================================================== [ 1525.441103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 1525.441118] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.441132] [ 1525.441138] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.441164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.441172] Hardware name: ARM Juno development board (r2) (DT) [ 1525.441181] Call trace: [ 1525.441187] show_stack+0x20/0x38 (C) [ 1525.441202] dump_stack_lvl+0x8c/0xd0 [ 1525.441219] print_report+0x118/0x608 [ 1525.441237] kasan_report+0xdc/0x128 [ 1525.441254] kasan_check_range+0x100/0x1a8 [ 1525.441273] __kasan_check_write+0x20/0x30 [ 1525.441288] kasan_atomics_helper+0x17ec/0x4858 [ 1525.441305] kasan_atomics+0x198/0x2e0 [ 1525.441321] kunit_try_run_case+0x170/0x3f0 [ 1525.441337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.441356] kthread+0x328/0x630 [ 1525.441369] ret_from_fork+0x10/0x20 [ 1525.441384] [ 1525.441389] Allocated by task 336: [ 1525.441396] kasan_save_stack+0x3c/0x68 [ 1525.441410] kasan_save_track+0x20/0x40 [ 1525.441424] kasan_save_alloc_info+0x40/0x58 [ 1525.441435] __kasan_kmalloc+0xd4/0xd8 [ 1525.441449] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.441463] kasan_atomics+0xb8/0x2e0 [ 1525.441476] kunit_try_run_case+0x170/0x3f0 [ 1525.441489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.441505] kthread+0x328/0x630 [ 1525.441514] ret_from_fork+0x10/0x20 [ 1525.441527] [ 1525.441532] The buggy address belongs to the object at ffff000826289e00 [ 1525.441532] which belongs to the cache kmalloc-64 of size 64 [ 1525.441548] The buggy address is located 0 bytes to the right of [ 1525.441548] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.441567] [ 1525.441571] The buggy address belongs to the physical page: [ 1525.441579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.441593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.441606] page_type: f5(slab) [ 1525.441617] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.441632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.441643] page dumped because: kasan: bad access detected [ 1525.441651] [ 1525.441655] Memory state around the buggy address: [ 1525.441663] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.441676] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.441688] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.441699] ^ [ 1525.441708] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.441720] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.441731] ================================================================== [ 1525.433334] ================================================================== [ 1525.433344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 1525.433359] Write of size 8 at addr ffff000826289e30 by task kunit_try_catch/336 [ 1525.433373] [ 1525.433379] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1525.433405] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1525.433413] Hardware name: ARM Juno development board (r2) (DT) [ 1525.433423] Call trace: [ 1525.433428] show_stack+0x20/0x38 (C) [ 1525.433443] dump_stack_lvl+0x8c/0xd0 [ 1525.433460] print_report+0x118/0x608 [ 1525.433477] kasan_report+0xdc/0x128 [ 1525.433494] kasan_check_range+0x100/0x1a8 [ 1525.433513] __kasan_check_write+0x20/0x30 [ 1525.433527] kasan_atomics_helper+0x1414/0x4858 [ 1525.433544] kasan_atomics+0x198/0x2e0 [ 1525.433560] kunit_try_run_case+0x170/0x3f0 [ 1525.433576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.433594] kthread+0x328/0x630 [ 1525.433606] ret_from_fork+0x10/0x20 [ 1525.433622] [ 1525.433626] Allocated by task 336: [ 1525.433633] kasan_save_stack+0x3c/0x68 [ 1525.433648] kasan_save_track+0x20/0x40 [ 1525.433662] kasan_save_alloc_info+0x40/0x58 [ 1525.433673] __kasan_kmalloc+0xd4/0xd8 [ 1525.433687] __kmalloc_cache_noprof+0x16c/0x3c0 [ 1525.433701] kasan_atomics+0xb8/0x2e0 [ 1525.433714] kunit_try_run_case+0x170/0x3f0 [ 1525.433727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1525.433742] kthread+0x328/0x630 [ 1525.433752] ret_from_fork+0x10/0x20 [ 1525.433764] [ 1525.433769] The buggy address belongs to the object at ffff000826289e00 [ 1525.433769] which belongs to the cache kmalloc-64 of size 64 [ 1525.433785] The buggy address is located 0 bytes to the right of [ 1525.433785] allocated 48-byte region [ffff000826289e00, ffff000826289e30) [ 1525.433804] [ 1525.433809] The buggy address belongs to the physical page: [ 1525.433816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a6289 [ 1525.433831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1525.433844] page_type: f5(slab) [ 1525.433855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 1525.433869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 1525.433880] page dumped because: kasan: bad access detected [ 1525.433888] [ 1525.433893] Memory state around the buggy address: [ 1525.433901] ffff000826289d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 1525.433913] ffff000826289d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1525.433925] >ffff000826289e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 1525.433936] ^ [ 1525.433945] ffff000826289e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.433958] ffff000826289f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1525.433968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 1523.219577] ================================================================== [ 1523.219598] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 1523.219631] Write of size 1 at addr ffff000800d20ef0 by task kunit_try_catch/227 [ 1523.219663] [ 1523.219677] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.219735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.219753] Hardware name: ARM Juno development board (r2) (DT) [ 1523.219773] Call trace: [ 1523.219784] show_stack+0x20/0x38 (C) [ 1523.219820] dump_stack_lvl+0x8c/0xd0 [ 1523.219857] print_report+0x118/0x608 [ 1523.219896] kasan_report+0xdc/0x128 [ 1523.219934] __asan_report_store1_noabort+0x20/0x30 [ 1523.219970] krealloc_more_oob_helper+0x5c0/0x678 [ 1523.220010] krealloc_more_oob+0x20/0x38 [ 1523.220046] kunit_try_run_case+0x170/0x3f0 [ 1523.220083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.220127] kthread+0x328/0x630 [ 1523.220156] ret_from_fork+0x10/0x20 [ 1523.220192] [ 1523.220202] Allocated by task 227: [ 1523.220218] kasan_save_stack+0x3c/0x68 [ 1523.220250] kasan_save_track+0x20/0x40 [ 1523.220281] kasan_save_alloc_info+0x40/0x58 [ 1523.220308] __kasan_krealloc+0x118/0x178 [ 1523.220340] krealloc_noprof+0x128/0x360 [ 1523.220371] krealloc_more_oob_helper+0x168/0x678 [ 1523.220403] krealloc_more_oob+0x20/0x38 [ 1523.220432] kunit_try_run_case+0x170/0x3f0 [ 1523.220463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.220500] kthread+0x328/0x630 [ 1523.220523] ret_from_fork+0x10/0x20 [ 1523.220551] [ 1523.220560] The buggy address belongs to the object at ffff000800d20e00 [ 1523.220560] which belongs to the cache kmalloc-256 of size 256 [ 1523.220597] The buggy address is located 5 bytes to the right of [ 1523.220597] allocated 235-byte region [ffff000800d20e00, ffff000800d20eeb) [ 1523.220640] [ 1523.220650] The buggy address belongs to the physical page: [ 1523.220667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20 [ 1523.220700] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1523.220730] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 1523.220762] page_type: f5(slab) [ 1523.220787] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.220821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.220856] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.220891] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.220926] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff [ 1523.220960] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 1523.220985] page dumped because: kasan: bad access detected [ 1523.221003] [ 1523.221012] Memory state around the buggy address: [ 1523.221031] ffff000800d20d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.221059] ffff000800d20e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1523.221088] >ffff000800d20e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 1523.221112] ^ [ 1523.221137] ffff000800d20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.221165] ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.221189] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 1523.212283] ================================================================== [ 1523.212310] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 1523.212343] Free of addr ffff0008261f4001 by task kunit_try_catch/221 [ 1523.212370] [ 1523.212384] CPU: 4 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.212443] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.212460] Hardware name: ARM Juno development board (r2) (DT) [ 1523.212481] Call trace: [ 1523.212492] show_stack+0x20/0x38 (C) [ 1523.212528] dump_stack_lvl+0x8c/0xd0 [ 1523.212565] print_report+0x118/0x608 [ 1523.212604] kasan_report_invalid_free+0xc0/0xe8 [ 1523.212646] __kasan_kfree_large+0x5c/0xa8 [ 1523.212686] free_large_kmalloc+0x68/0x150 [ 1523.212722] kfree+0x270/0x3c8 [ 1523.212754] kmalloc_large_invalid_free+0x108/0x270 [ 1523.212792] kunit_try_run_case+0x170/0x3f0 [ 1523.212830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.213123] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 1523.217944] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 1523.217980] Write of size 1 at addr ffff000800d20eeb by task kunit_try_catch/227 [ 1523.218013] [ 1523.218027] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.218085] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.218103] Hardware name: ARM Juno development board (r2) (DT) [ 1523.218124] Call trace: [ 1523.218135] show_stack+0x20/0x38 (C) [ 1523.218170] dump_stack_lvl+0x8c/0xd0 [ 1523.218208] print_report+0x118/0x608 [ 1523.218247] kasan_report+0xdc/0x128 [ 1523.218285] __asan_report_store1_noabort+0x20/0x30 [ 1523.218321] krealloc_more_oob_helper+0x60c/0x678 [ 1523.218361] krealloc_more_oob+0x20/0x38 [ 1523.218397] kunit_try_run_case+0x170/0x3f0 [ 1523.218435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.218479] kthread+0x328/0x630 [ 1523.218509] ret_from_fork+0x10/0x20 [ 1523.218545] [ 1523.218554] Allocated by task 227: [ 1523.218571] kasan_save_stack+0x3c/0x68 [ 1523.218603] kasan_save_track+0x20/0x40 [ 1523.218635] kasan_save_alloc_info+0x40/0x58 [ 1523.218662] __kasan_krealloc+0x118/0x178 [ 1523.218694] krealloc_noprof+0x128/0x360 [ 1523.218726] krealloc_more_oob_helper+0x168/0x678 [ 1523.218758] krealloc_more_oob+0x20/0x38 [ 1523.218788] kunit_try_run_case+0x170/0x3f0 [ 1523.218819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.218856] kthread+0x328/0x630 [ 1523.218879] ret_from_fork+0x10/0x20 [ 1523.218908] [ 1523.218917] The buggy address belongs to the object at ffff000800d20e00 [ 1523.218917] which belongs to the cache kmalloc-256 of size 256 [ 1523.218954] The buggy address is located 0 bytes to the right of [ 1523.218954] allocated 235-byte region [ffff000800d20e00, ffff000800d20eeb) [ 1523.218997] [ 1523.219007] The buggy address belongs to the physical page: [ 1523.219025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d20 [ 1523.219058] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1523.219088] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 1523.219121] page_type: f5(slab) [ 1523.219147] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.219181] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.219217] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 1523.219251] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 1523.219286] head: 0bfffe0000000001 fffffdffe0034801 00000000ffffffff 00000000ffffffff [ 1523.219320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 1523.219346] page dumped because: kasan: bad access detected [ 1523.219364] [ 1523.219373] Memory state around the buggy address: [ 1523.219392] ffff000800d20d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.219421] ffff000800d20e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1523.219450] >ffff000800d20e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 1523.219473] ^ [ 1523.219498] ffff000800d20f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.219526] ffff000800d20f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1523.219550] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 1523.210174] ================================================================== [ 1523.210202] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 1523.210236] Read of size 1 at addr ffff000827890000 by task kunit_try_catch/219 [ 1523.210267] [ 1523.210282] CPU: 3 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1523.210341] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 1523.210358] Hardware name: ARM Juno development board (r2) (DT) [ 1523.210379] Call trace: [ 1523.210390] show_stack+0x20/0x38 (C) [ 1523.210426] dump_stack_lvl+0x8c/0xd0 [ 1523.210465] print_report+0x118/0x608 [ 1523.210504] kasan_report+0xdc/0x128 [ 1523.210542] __asan_report_load1_noabort+0x20/0x30 [ 1523.210577] kmalloc_large_uaf+0x2cc/0x2f8 [ 1523.210612] kunit_try_run_case+0x170/0x3f0 [ 1523.210650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1523.210694] kthread+0x328/0x630 [ 1523.210724] ret_from_fork+0x10/0x20 [ 1523.210760] [ 1523.210770] The buggy address belongs to the physical page: [ 1523.210787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7890 [ 1523.210819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 1523.210860] raw: 0bfffe0000000000 fffffdffe09e2508 ffff000935e10c40 0000000000000000 [ 1523.210894] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1523.210919] page dumped because: kasan: bad access detected [ 1523.210937] [ 1523.210946] Memory state around the buggy address: [ 1523.210965] ffff00082788ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1523.210994] ffff00082788ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1523.211023] >ffff000827890000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1523.211047] ^ [ 1523.211064] ffff000827890080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1523.211092] ffff000827890100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1523.211116] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-cpu_set_hyp_vector
[ 1516.430544] ================================================================== [ 1516.430553] BUG: KASAN: global-out-of-bounds in cpu_set_hyp_vector+0x190/0x1b0 [ 1516.430579] Read of size 8 at addr ffff800087a64bc0 by task cpuhp/1/21 [ 1516.430590] [ 1516.430600] CPU: 1 UID: 0 PID: 21 Comm: cpuhp/1 Tainted: G W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1516.430620] Tainted: [W]=WARN, [N]=TEST [ 1516.430626] Hardware name: ARM Juno development board (r2) (DT) [ 1516.430633] Call trace: [ 1516.430639] show_stack+0x20/0x38 (C) [ 1516.430655] dump_stack_lvl+0x8c/0xd0 [ 1516.430672] print_report+0x310/0x608 [ 1516.430690] kasan_report+0xdc/0x128 [ 1516.430705] __asan_report_load8_noabort+0x20/0x30 [ 1516.430718] cpu_set_hyp_vector+0x190/0x1b0 [ 1516.430733] cpu_hyp_init+0x80/0x108 [ 1516.430746] kvm_arch_enable_virtualization_cpu+0x28/0x98 [ 1516.430763] kvm_enable_virtualization_cpu+0x74/0x118 [ 1516.430779] kvm_online_cpu+0x18/0x30 [ 1516.430792] cpuhp_invoke_callback+0x5b8/0x1620 [ 1516.430810] cpuhp_thread_fun+0x230/0x5d8 [ 1516.430827] smpboot_thread_fn+0x2e8/0x760 [ 1516.430843] kthread+0x328/0x630 [ 1516.430855] ret_from_fork+0x10/0x20 [ 1516.430870] [ 1516.430874] The buggy address belongs to the variable: [ 1516.430878] hyp_spectre_vector_selector+0x20/0x40 [ 1516.430894] [ 1516.430900] The buggy address belongs to the virtual mapping at [ 1516.430900] [ffff800085c60000, ffff800087b81000) created by: [ 1516.430900] paging_init+0x66c/0x7d0 [ 1516.430918] [ 1516.430923] The buggy address belongs to the physical page: [ 1516.430930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87c64 [ 1516.430943] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 1516.430963] raw: 03fffe0000002000 fffffdffc01f1908 fffffdffc01f1908 0000000000000000 [ 1516.430973] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 1516.430980] page dumped because: kasan: bad access detected [ 1516.430985] [ 1516.430989] Memory state around the buggy address: [ 1516.430995] ffff800087a64a80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 1516.431004] ffff800087a64b00: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 1516.431012] >ffff800087a64b80: f9 f9 f9 f9 00 00 00 00 f9 f9 f9 f9 01 f9 f9 f9 [ 1516.431018] ^ [ 1516.431025] ffff800087a64c00: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 [ 1516.431033] ffff800087a64c80: 00 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 1516.431039] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 1571.257089] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#5: kunit_try_catch/729 [ 1571.320186] Modules linked in: [ 1571.323298] CPU: 5 UID: 0 PID: 729 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1571.334512] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 1571.340379] Hardware name: ARM Juno development board (r2) (DT) [ 1571.346336] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1571.353350] pc : intlog10+0x38/0x48 [ 1571.356885] lr : intlog10_test+0xe4/0x200 [ 1571.360938] sp : ffff80008ade7c10 [ 1571.364280] x29: ffff80008ade7c90 x28: 0000000000000000 x27: 0000000000000000 [ 1571.371504] x26: 1fffe001001e4741 x25: 0000000000000000 x24: ffff80008ade7ce0 [ 1571.378724] x23: ffff80008ade7d00 x22: 0000000000000000 x21: 1ffff000115bcf82 [ 1571.385945] x20: ffff800083bfcb60 x19: ffff800087d07990 x18: 00000000970c792d [ 1571.393167] x17: 0000000000000001 x16: ffff000935e50d28 x15: 00000000938f8781 [ 1571.400386] x14: 0000000000000000 x13: 1fffe00126bca189 x12: ffff700010f52389 [ 1571.407607] x11: 1ffff00010f52388 x10: ffff700010f52388 x9 : ffff80008123d25c [ 1571.414827] x8 : ffff800087a91c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 1571.422047] x5 : ffff7000115bcf82 x4 : 1ffff00010fa0f3b x3 : 1ffff0001077f96c [ 1571.429266] x2 : 1ffff0001077f96c x1 : 0000000000000003 x0 : 0000000000000000 [ 1571.436486] Call trace: [ 1571.438958] intlog10+0x38/0x48 (P) [ 1571.442497] kunit_try_run_case+0x170/0x3f0 [ 1571.446733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1571.452279] kthread+0x328/0x630 [ 1571.455553] ret_from_fork+0x10/0x20 [ 1571.459182] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 1570.397883] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#3: kunit_try_catch/711 [ 1571.100215] Modules linked in: [ 1571.103323] CPU: 3 UID: 0 PID: 711 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 1571.114538] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 1571.120406] Hardware name: ARM Juno development board (r2) (DT) [ 1571.126363] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1571.133377] pc : intlog2+0xd8/0xf8 [ 1571.136826] lr : intlog2_test+0xe4/0x200 [ 1571.140793] sp : ffff80008ace7c10 [ 1571.144135] x29: ffff80008ace7c90 x28: 0000000000000000 x27: 0000000000000000 [ 1571.151359] x26: 1fffe001049a0781 x25: 0000000000000000 x24: ffff80008ace7ce0 [ 1571.158581] x23: ffff80008ace7d00 x22: 0000000000000000 x21: 1ffff0001159cf82 [ 1571.165800] x20: ffff800083bfca60 x19: ffff800087d07990 x18: 0000000043bd4e3d [ 1571.173020] x17: 00000000a716c23f x16: 000000006c8c128a x15: 00000000f5fb0e96 [ 1571.180241] x14: 0000000000000000 x13: 1fffe00126bc1989 x12: ffff700010f52389 [ 1571.187462] x11: 1ffff00010f52388 x10: ffff700010f52388 x9 : ffff80008123d45c [ 1571.194682] x8 : ffff800087a91c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 1571.201902] x5 : ffff70001159cf82 x4 : 1ffff00010fa0f3b x3 : 1ffff0001077f94c [ 1571.209122] x2 : 1ffff0001077f94c x1 : 0000000000000003 x0 : 0000000000000000 [ 1571.216341] Call trace: [ 1571.218811] intlog2+0xd8/0xf8 (P) [ 1571.222264] kunit_try_run_case+0x170/0x3f0 [ 1571.226500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 1571.232047] kthread+0x328/0x630 [ 1571.235321] ret_from_fork+0x10/0x20 [ 1571.238950] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - uboot-action
(no logs available)
Failure - lava - uboot-commands
(no logs available)
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - exception-warning-kerneltimeclockevents-at-cev_delta2ns
KNOWN ISSUE - Juno-r2 WARNING kernel time clockevents.c cev_delta2ns clockevents_config.part
------------[ cut here ]------------ [ 0.000000] WARNING: kernel/time/clockevents.c:38 at cev_delta2ns+0xf4/0x1c0, CPU#0: swapper/0/0 [ 0.000000] Modules linked in: [ 0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.16.0-rc3-next-20250626 #1 PREEMPT [ 0.000000] Hardware name: ARM Juno development board (r2) (DT) [ 0.000000] pstate: 100000c5 (nzcV daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 0.000000] pc : cev_delta2ns+0xf4/0x1c0 [ 0.000000] lr : clockevents_config.part.0+0xa4/0x160 [ 0.000000] sp : ffff800085c67b20 [ 0.000000] x29: ffff800085c67b20 x28: 0000000000000400 x27: 0000000000000000 [ 0.000000] x26: ffff0008002d0c70 x25: 1fffe0010005a18e x24: 1fffe0010005a18e [ 0.000000] x23: 0000000000000004 x22: ffff0008002d0c74 x21: 0000000000000020 [ 0.000000] x20: 000000000000000f x19: 0000000f00000000 x18: ffff700010b8cefb [ 0.000000] x17: ffff8000857ae65c x16: ffff8000857b3470 x15: ffff8000857b26a0 [ 0.000000] x14: ffff8000808f0ffc x13: ffff8000856b2e44 x12: ffff700010f5cf3f [ 0.000000] x11: 1ffff00010f5cf3e x10: ffff700010f5cf3e x9 : ffff8000803d47ec [ 0.000000] x8 : ffff800087ae79f0 x7 : 000000001dcd6500 x6 : 000000003b9aca00 [ 0.000000] x5 : 1fffe0010005a18e x4 : 0000000000000003 x3 : 0000000000000000 [ 0.000000] x2 : 0000000000000000 x1 : ffff0008002d0c40 x0 : 0000000000000000 [ 0.000000] Call trace: [ 0.000000] cev_delta2ns+0xf4/0x1c0 (P) [ 0.000000] clockevents_config.part.0+0xa4/0x160 [ 0.000000] clockevents_config_and_register+0x8c/0xf0 [ 0.000000] arch_timer_mem_frame_register+0x2fc/0x4f8 [ 0.000000] arch_timer_mem_of_init+0x408/0x560 [ 0.000000] timer_probe+0xf4/0x1d0 [ 0.000000] time_init+0x24/0x98 [ 0.000000] start_kernel+0x1cc/0x3d0 [ 0.000000] __primary_switched+0x8c/0xa0 [ 0.000000] ---[ end trace 0000000000000000 ]---